In our previous post, we discussed the arrival of Chain of Transaction Integrity (CTI) as an integral part of your data plan. Many systems today ensure data integrity within an individual system, but CTI covers the entire lifecycle of the data from creation to final resting place within a data warehouse or other data repository.
Foreside Group has partnered with Controls Force to provide our clients with a solution to perform CTI. Controls Force collects the data and builds a Life of Data Model (LDM) on how it should move through the entire chain as well as how it should relate from one criterion to another. Let’s go into more detail.
Controls Force builds LDM by analyzing the data relationship across multiple platforms to help identify when the data is not aligning correctly (see example used in the first post with a mortgage event). What is compelling with the Controls Force approach are the alerts it produces to let the organization know that there is a problem such as out of tolerance, approaching tolerance, cross reference errors and missing data. Types of alerts are listed below:
- System configuration setup – when integrating a new system CTI can ensure that the new system interacts with existing system in a complete and meaningful way.
- System configuration changes – the result of unintended consequences when one data system administrator changes a system without understanding downstream or cross-platform implications.
- Fraudulent activity – detection of intentional circumventing of internal controls
- Incomplete data – required precursor transactions are missing or data fields are incomplete for interrelated data.
- Excessive data – e.g. over billing without matching records
- Extract-Transform-Load Errors – making sure that programmatic functions are properly depositing the data into the repository.
CTI monitoring service
As you can well imagine, not all alerts are equal and not all need to be immediately addressed. Consider the scenario where CTI is producing several alerts. Some alerts require immediate action such as a system configuration change that is producing thousands of bad transactions each hour. Others might be indicators of fraud, but are not necessarily fraud, and should be investigated. And yet others could be compiled and reported on a weekly or monthly basis as tolerance limits are approached.
In an organization, those alerts would need to be routed to the appropriate person(s). Let’s assume they are receiving those alerts via email. As we are all aware, people have other jobs to do and managing an email alert inbox could be overwhelming. Also, critical alerts may go unnoticed barring some email rules that would elevate the alert in some fashion.
Foreside Group has created a service to assist in alert management. Think along the lines of a home security monitoring service. Some alarms from a home should be routed directly to the appropriate emergency service (heat and smoke detectors going off all at once or noise, motion and parameter breach are all activated) while others might be routed to the owner’s mobile device or a phone call (single motion, delayed deactivation at the panel). With Foreside Group’s CTI monitoring service, we receive the alerts on behalf of our clients, categorize them, notify the correct person for critical alerts, and provide activity /diagnostic reports for low level alerts. This removes the client from having to manage these overheads so they can focus on their business.
Whether you manage your own alerts or have the experts at Foreside Group manage them for you, CTI monitoring is a critical part of planning your next data availability project.
Contact us for a discovery call.