Survivalist Pro
Photo by Sora Shimazaki Pexels Logo Photo: Sora Shimazaki

What are the two types of data integrity?

Maintaining data integrity requires an understanding of the two types of data integrity: physical integrity and logical integrity. Both are collections of processes and methods that enforce data integrity in both hierarchical and relational databases.

What are the 6 C's traits of a good leader?
What are the 6 C's traits of a good leader?

The 6 C's of Effective Leadership Critical thinking. This skill is defined by an ability to look past the first tidbit of information you receive,...

Read More »
What happens to your skin when you stop eating meat?
What happens to your skin when you stop eating meat?

Your Skin Will Start to Glow The benefits of going meat-free can be external too. According to holistic nutritionist Susan Tucker MD, the founder...

Read More »

Imagine this: A pharmaceutical company touts the safety of its new wonder drug. But when the FDA inspects the offshore production facility, work is halted immediately; important quality control data is missing. Unfortunately, this real-life example of compromised data integrity isn’t uncommon. Problems with the accuracy of data and consistency of data exist across all industries and can cause everything from minor hassles to significant business problems. In this era of big data, when more pieces of information are processed and stored than ever, data health has become a pressing issue — and implementing measures that preserve the integrity of the data that’s collected is increasingly important. Understanding the fundamentals of data integrity and how it works is the first step in keeping data safe. Read on to learn what data integrity is, why it’s essential, and what you can do to keep your data healthy.

What is data integrity?

Data integrity is the overall accuracy, completeness, and consistency of data. Data integrity also refers to the safety of data in regard to regulatory compliance — such as GDPR compliance — and security. It is maintained by a collection of processes, rules, and standards implemented during the design phase. When the integrity of data is secure, the information stored in a database will remain complete, accurate, and reliable no matter how long it’s stored or how often it’s accessed. The importance of data integrity in protecting yourself from data loss or a data leak cannot be overstated: in order to keep your data safe from outside forces with malicious intent, you must first ensure that internal users are handling data correctly. By implementing the appropriate data validation and error checking, you can ensure that sensitive data is never miscategorized or stored incorrectly, thus exposing you to potential risk.

Types of data integrity

Maintaining data integrity requires an understanding of the two types of data integrity: physical integrity and logical integrity. Both are collections of processes and methods that enforce data integrity in both hierarchical and relational databases.

Physical integrity

Physical integrity is the protection of the wholeness and accuracy of that data as it’s stored and retrieved. When natural disasters strike, power goes out, or hackers disrupt database functions, physical integrity is compromised. Human error, storage erosion, and a host of other issues can also make it impossible for data processing managers, system programmers, applications programmers, and internal auditors to obtain accurate data.

Logical integrity

Logical integrity keeps data unchanged as it’s used in different ways in a relational database. Logical integrity protects data from human error and hackers as well, but in a much different way than physical integrity does. There are four types of logical integrity: Entity integrity Entity integrity relies on the creation of primary keys — the unique values that identify pieces of data — to ensure that data isn’t listed more than once and that no field in a table is null. It’s a feature of relational systems which store data in tables that can be linked and used in a variety of ways. Entity integrity relies on the creation of primary keys — the unique values that identify pieces of data — to ensure that data isn’t listed more than once and that no field in a table is null. It’s a feature of relational systems which store data in tables that can be linked and used in a variety of ways. Referential integrity Referential integrity refers to the series of processes that make sure data is stored and used uniformly. Rules embedded into the database’s structure about how foreign keys are used ensure that only appropriate changes, additions, or deletions of data occur. Rules may include constraints that eliminate the entry of duplicate data, guarantee that data entry is accurate, and/or disallow the entry of data that doesn’t apply. Referential integrity refers to the series of processes that make sure data is stored and used uniformly. Rules embedded into the database’s structure about how foreign keys are used ensure that only appropriate changes, additions, or deletions of data occur. Rules may include constraints that eliminate the entry of duplicate data, guarantee that data entry is accurate, and/or disallow the entry of data that doesn’t apply. Domain integrity Domain integrity is the collection of processes that ensure the accuracy of each piece of data in a domain. In this context, a domain is a set of acceptable values that a column is allowed to contain. It can include constraints and other measures that limit the format, type, and amount of data entered.

What makes God happy with us?
What makes God happy with us?

We make God happy when we obey Him. We can follow David's example by praying for understanding when we read the Word so that we can do what it...

Read More »
How many calories a day is starvation?
How many calories a day is starvation?

Starvation calories are an intake of fewer than 600 calories per day, however; any caloric intake below the recommended minimum doesn't provide the...

Read More »

Domain integrity is the collection of processes that ensure the accuracy of each piece of data in a domain. In this context, a domain is a set of acceptable values that a column is allowed to contain. It can include constraints and other measures that limit the format, type, and amount of data entered. User-defined integrity User-defined integrity involves the rules and constraints created by the user to fit their particular needs. Sometimes entity, referential, and domain integrity aren’t enough to safeguard data. Often, specific business rules must be taken into account and incorporated into data integrity measures.

Check out our Definitive Guide to Data Quality today Get the ebook

What data integrity isn’t

With so much talk about data integrity, it’s easy for its true meaning to be muddled. Often data security and data quality are incorrectly substituted for data integrity, but each term has a distinct meaning.

Data integrity is not data security

Data security is the collection of measures taken to keep data from getting corrupted. It incorporates the use of systems, processes, and procedures that restrict unauthorized access and keep data inaccessible to others who may use it in harmful or unintended ways. Breaches in data security may be small and easy to contain or large and capable of causing significant damage. While data integrity is concerned with keeping information intact and accurate for the entirety of its existence, the goal of data security is to protect information from outside attacks. Data security is but one of the many facets of data integrity. Data security is not broad enough to include the many processes necessary for keeping data unchanged over time.

Data integrity is not data quality

Does the data in your database meet company-defined standards and the needs of your business? Data quality answers these questions with an assortment of processes that measure your data’s age, relevance, accuracy, completeness, and reliability. Much like data security, data quality is only a part of data integrity, but a crucial one. Data integrity encompasses every aspect of data quality and goes further by implementing an assortment of rules and processes that govern how data is entered, stored, transferred, and much more.

Data integrity and GDPR compliance

Data integrity is key to complying with data protection regulations like GDPR. Non-compliance with these regulations can make companies liable for large penalties. In some instances, they may be sued on top of these significant fees. Repeated compliance violations can even put companies out of business. Fortunately, there are ways to ensure the data integrity you need to comply with GDPR and other data protection legislation. Take a look at our series, Practical Steps to GDPR Compliance.

Data integrity risks

Which of the 6 C's is most important?
Which of the 6 C's is most important?

Understanding the 6 Cs Care is the first C; Care is defined as the provision of what is necessary for the health, welfare, maintenance, and...

Read More »
What are the 5 P's of effective communication?
What are the 5 P's of effective communication?

No matter what your size, keeping these 5 P's in mind when communicating change will help, especially when scale is adding to the stress: Plan,...

Read More »

An assortment of factors can affect the integrity of the data stored in a database. A few examples include the following: Human error : When individuals enter information incorrectly, duplicate or delete data, don’t follow the appropriate protocols, or make mistakes during the implementation of procedures meant to safeguard information, data integrity is put in jeopardy. : When individuals enter information incorrectly, duplicate or delete data, don’t follow the appropriate protocols, or make mistakes during the implementation of procedures meant to safeguard information, data integrity is put in jeopardy. Transfer errors : When data can’t successfully transfer from one location in a database to another, a transfer error has occurred. Transfer errors happen when a piece of data is present in the destination table, but not in the source table in a relational database. : When data can’t successfully transfer from one location in a database to another, a transfer error has occurred. Transfer errors happen when a piece of data is present in the destination table, but not in the source table in a relational database. Bugs and viruses : Spyware, malware, and viruses are pieces of software that can invade a computer and alter, delete, or steal data. : Spyware, malware, and viruses are pieces of software that can invade a computer and alter, delete, or steal data. Compromised hardware: Sudden computer or server crashes, and problems with how a computer or other device functions are examples of significant failures and may be indications that your hardware is compromised. Compromised hardware may render data incorrectly or incompletely, limit or eliminate access to data, or make information hard to use. Risks to data integrity can easily be minimized or eliminated by doing the following: Limiting access to data and changing permissions to restrict changes to information by unauthorized parties Validating data to make sure it’s correct both when it’s gathered and when it’s used

Backing up data

Using logs to keep track of when data is added, modified, or deleted

Conducting regular internal audits

Using error detection software

Getting started with data integrity

Protecting the integrity of your company’s data using traditional methods can seem like an overwhelming task. Secure, cloud-based data integration platforms offer a modern alternative that provide a real-time view of all of your data. With industry-leading cloud integration tools, you can connect multiple source data applications and get access to all of your company’s data in one location. Take a look at the Definitive Guide to Data Governance to find out how to establish a framework for data integrity.

What is the 10 5 5 rice rule?
What is the 10 5 5 rice rule?

Finally, Cho uses the “10-5-5 rule.” That means bringing the rice to medium-high heat for 10 minutes, followed by low heat for 5 minutes, then he...

Read More »
Will 56 day rule continue 2022?
Will 56 day rule continue 2022?

The new government consultation will now gather evidence on the effect and benefits of allowing this 56-day rule to be extended to 2023. Jun 20, 2022

Read More »
Can I put a touring caravan on agricultural land?
Can I put a touring caravan on agricultural land?

It's possible to keep touring caravans on agricultural land, but you may need planning permission. If you plan to do so, it's always worthwhile...

Read More »
Can I use flour 2 years out of date?
Can I use flour 2 years out of date?

So go by smell: whole grain flour with a strong, unpleasant aroma won't taste good and shouldn't be used for baking. Usage past the best-by date:...

Read More »