For VendorsBlog

Data access

Data access

Data access is a generic term referring to a process which has both an IT-specific meaning and other connotations involving access rights in a broader legal and/or political sense. Two fundamental categories of data access exist:

  • sequential access (as in magnetic tape, for example)
  • random access (as in indexed media)

The sequential method requires information to be moved within the disk using a seek operation until the data is located. Each segment of data has to be read one after another until the requested data is found. Reading data randomly allows users to store or retrieve data anywhere on the disk, and the data is accessed in constant time.

Oftentimes when using random access, the data is split into multiple parts or pieces and located anywhere randomly on a disk. Sequential files are usually faster to load and retrieve because they require fewer seek operations.

Access data management crucially involves authorization to access different data repositories. Data access solutions can help distinguish the abilities of administrators and users. For example, administrators may have the ability to remove, edit and add data, while general users may not even have "read" rights if they lack access to particular information.

A data access right (DAR) is a permission that has been granted that allows a person or computer program to locate and read digital information at rest. Digital access rights play and important role in information security and compliance.

In compliance, DARs are often granted to data subjects by law. For example, under the General Data Protection Regulation (GDPR) in the European Union, a data subject has the right to access their own personal data and request a correction or erasure.

To avoid losing or corrupting corporate data, organizations should grant only the necessary required access to each user, a concept known as the principle of least privilege (POLP). To ensure confidentiality, information should be used by authorized personnel only. To maintain data integrity, data should not be modified accidentally or voluntarily. Additionally, to provide data availability, the system should operate within the required levels of service.

Historically, each repository (including each different database, file system, etc.), might require the use of different methods and languages, and many of these repositories stored their content in different and incompatible formats.

Over the years standardized languages, methods, and formats, have developed to serve as interfaces between the often proprietary, and always idiosyncratic, specific languages and methods. Such standards include SQL (1974- ), ODBC (ca 1990- ), JDBC, XQJ, ADO.NET, XML, XQuery, XPath (1999- ), and Web Services.

Some of these standards enable translation of data from unstructured (such as HTML or free-text files) to structured (such as XML or SQL). Structures such as connection strings and DBURLs can attempt to standardise methods of connecting to databases.


The most popular products in category Data access All category products

F.A.Q. about Data access

What is a database?

A database is a collection of related data which represents some aspect of the real world. A database system is designed to be built and populated with data for a certain task.

What is DBMS?

Database Management System (also known as DBMS) is a access database software for storing and retrieving users' data by considering appropriate security measures. It allows users to create their own databases as per their requirement.

It consists of a group of programs which manipulate the database and provide an interface between the database. It includes the user of the database and other application programs.

The DBMS accepts the request for data from an application and instructs the operating system to provide the specific data. In large systems, a DBMS helps users and other third-party software to store and retrieve data.

What are the best data access rights practices?

To keep data access control issues from arising, the following practices are recommended:

  • Company security policies should specify what employees can and cannot do on their computers. For example, will individual user data access to allow personal emails, file downloads, software installation, information ownership and authorized or unauthorized website access.
  • Data should be classified based on its degree of confidentiality (and the risks associated with being leaked) and criticality (the integrity and the risk of alteration or destruction).
  • Control to data should be established using required authorization or authentication and by employing traceability (which consists of tracking access to sensitive IT resources).
  • Regular detailed audits should be performed to help set up controls surrounding identity management, privileged users and access to resources.
  • The rights of users should be limited. For example, Windows 10 offers standard and administrator accounts, but most users should just have standard accounts to complete their daily tasks.