Want to create interactive content? It’s easy in Genially!

Get started free

Data Lifecycle

FRA Online Courses

Created on February 1, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

6. Destroy

5. Archive

4. Share

3. Use

2. Store

1. Create

Continuous Process

The data lifecycle is a continuous process that involves creating, storing, managing, analysing, and eventually disposing of data in a controlled manner.

The Process

The data lifecycle is the process that data goes through from its creation (or collection) to its storage, management and eventual disposal.

Data Lifecycle

Involves the generation or collection of raw data. Occurs at the source, whether through user input, sensors, or other means. It is the foundation for the entire data lifecycle.

Create:

Data creation is the initial stage where information is generated or collected.

What is data lifecycle management? (10 min read)

Data Science Life Cycle in 5 Steps! (7 min read)

Extra Resources

Archive:

The systematic transfer of less frequently accessed information to long-term storage. Data Retention policies at organisational level determine how long the data needs to be retained based on legal, regulatory, and business requirements.

Preserves historical or reference data. Ensures compliance with regulatory requirements and preserves institutional knowledge.

Use:

Data usage involves accessing and leveraging stored information for various purposes. It involves activities such as data cleaning, integration and quality assurance.

Users retrieve and manipulate data for analysis, decision-making, or reporting. The stage where data adds value to the organisation. Responsible use ensures compliance with privacy and security standards.

Store:

Data storage is the secure and organised retention of created information for future use.

Involves selecting appropriate storage systems (databases, servers, etc.). Ensures data integrity, confidentiality, and accessibility. Storage locations can vary based on organisational needs and security protocols.

Share:

The intentional and secure distribution of data among authorised parties. It involves preparing reports, dashboards, or presentations for decision-makers.

Facilitates collaboration and communication. Involves sharing data within and outside the organisation. Ensures proper controls and permissions for shared information.

Destroy:

The secure and permanent removal of obsolete or unnecessary information.

Implemented after careful consideration of data retention policies. Supports data privacy and compliance with regulations. Responsible deletion reduces clutter, streamlines processes, and minimises security risks.