We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Data Integrity?

Mary McMahon
By
Updated: May 16, 2024
Views: 52,985
Share

Data integrity is a term used to refer to the accuracy and reliability of data. Data must be complete, with no variations or compromises from the original, to be considered reliable and accurate. Compromises to data integrity can happen in a number of ways. In industries where data is handled, identifying and addressing potential sources of damage to data is an important aspect of data security.

Problems with data integrity can start with a human source. People entering records may make mistakes, leading to variations between the original data and the data stored in a system. Likewise, people can make mistakes while transferring or copying data electronically, causing a disparity between different versions of a file or references to a file. In order for data integrity to be maintained, there need to be no changes or alterations to the data.

As data is entered, stored, accessed, moved, and updated, weak points in a system can compromise the data. Glitches in a computer may lead to partial overwrites of data or other data errors. Viruses can be created to attack data integrity, some working quietly to damage data without betraying their presence. Interruptions in various operations can lead to problems, as can mechanical damage like exposure to magnets or physical damage caused by power outages and other events.

Designers of data architecture for everything from government databases to the file systems on personal computers must consider data integrity when working on such systems. They think about the way the system will be used, identify obvious potential threats, and develop methods for securing the system to protect the data. Failure to think ahead can result in catastrophic compromises and the potential inadvertent release of secure or sensitive data, an especially large concern with databases containing personal or identifiable information about individuals and institutions.

People working with databases may be provided with training in data integrity, including reminders to review data as it is entered, to regularly save and back up data, and to report any suspected compromises or questionable activities immediately. The more quickly a problem is recognized, the easier it will be to address. Support personnel, such as information technology staff, also work on protecting databases from outside attacks with tools like firewalls, antivirus software, and periodic scans for malicious code. Likewise, systems can also be designed to lock data in read-only format to protect it from tampering or interference that might compromise its integrity.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
By nanny3 — On Apr 11, 2011

Nothing but respect for data integrity! Remember the good old days when you lost entire term papers if you sneezed at the computer? I lost many brain cells terrified that I would never be able to redo all of that work on time. Now, we've got backups for our backups! It's pretty amazing to the folks who remember actually writing stuff by hand. Heck, now we're talking about ideas like data integration! That was totally unheard of not too long ago. (Really, I'm not that old.)

By Domido — On Apr 09, 2011

Anyone who works with valuable information knows how important data integrity is. The more that we see technology expanding the more we see how essential data management is, even on a personal level. Thank goodness for firewalls and PC security!

Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-is-data-integrity.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.