IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Security Education and Awareness Workshop January 15-16, 2004 Baltimore, MD.
Time Sensitive Standards Presented by RPM Vince Dauro.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Security Controls – What Works
Information Security Policies and Standards
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Chapter 5 IT Processes Presented by Dr. Mohamed Sammouda.
Managing the Information Technology Resource Jerry N. Luftman
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
ECM Project Roles and Responsibilities
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Session 3 – Information Security Policies
Network security policy: best practices
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
Information Systems Security Computer System Life Cycle Security.
DAY TO DAY USAGE OF THE NETWORK for academic and administrative support (How we make it work) Presented by: Donnie Mize, Network Manager, FTCC Wanda Jones,
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Copyright ©2011 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Health Information Technology and Management Richard.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Get off on the right foot Included with SOTI JumpStart: Creation and deployment of a single package FileSync and Single lockdown configuration, enabling.
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Best Practices: Financial Resource Management February 2011.
The board of each community college district shall within or before the first quarter of each fiscal year, adopt an annual budget which it deems necessary.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
DIVISION OF REVENUE BILL VOTE 16: HIGHER EDUCATION AND TRAINING Presentation to Standing Committee on Appropriations 26 February 2010.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Georgia State University Making the Student Technology Fee Work for Students Carolyn Gard, Director University Educational Technology Services and Shehab.
Understanding School Finances School Councils. What are school council’s major responsibilities regarding finance? 1.To approve the school’s annual budget.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
Information Security Training for People who Supervise Computer Users.
9-Sep-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) CERN, 9 September 2003 David Kelsey CCLRC/RAL, UK
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Total Cost of Ownership for Technology Resources at Mission College Description and Recommendations.
Informational Update Student Success Fee Funded Project Status Emerging Technologies & Instructional Technologies Committees IT Governance Executive Committee.
Understanding School Finances School Councils. What are school council’s major responsibilities with regard to finance? 1.To develop the school’s annual.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
1 PARCC Data Privacy & Security Policy December 2013.
Recommendations for: Upgrading Technology Enhanced Learning Spaces Upgrade of Computers in Open & College Labs IT Governance Executive Committee January.
Funding Technology at Mission College Challenges and Recommendations.
Chapter 8 Auditing in an E-commerce Environment
Updates & Recommendations from Instructional Technology Committee Computers in College Labs IT Governance Executive Committee March 28, 2014 Meeting IT.
California Maritime Academy Information Technology Review Results and Recommendations August 2014.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
SECURITY AND ELECTRONIC COMMUNICATIONS WHAT YOU NEED TO KNOW FOR YOUR AUDIT.
Office of Information Technology October 18, 2016
Executive Committee Meeting [DATE]
Red Flags Rule An Introduction County College of Morris
Executive Committee Meeting [DATE]
Information Technology Organization Overview RFP #220-05
Presentation transcript:

IT Governance Purpose: Information technology is a catalyst for productivity, creativity and community that enhances learning opportunities in an environment of unlimited demands and limited resources. Executive Committee Meeting March 11, 2016 Adopting a strategic approach to information technology planning, budgeting and implementation at Cal Poly Pomona.

Information Security Recommendations Appropriate Use for Both Remote Access and Privileged User Activities Instructional Technology Recommendations Classroom Lab Upgrades IT Contingency Money IT Governance Executive Committee Action Items

Information Security Working Group Action Items Presenter: Rufus Gant

Information Security Working Group Issue Background Significant incident Fall Quarter 2015 / An employee’s credentials were unknowingly obtained and used from a remote location to accomplish unauthorized student record modifications. CIO directed a review aimed at minimizing the chances for reoccurrence. Results: The proposed institution of guidance addressing appropriate use both Remote Access and Privileged User activities Standards drafted to document the expectations and responsibilities associated with being granted remote access and/or privileged access to university systems and data.

Information Security Working Group Remote Access Standard Overview Remote users must ensure that their Remote Host (External Access) Device meets End User Security guidelines Users requiring remote access to CPP’s electronic resources for business, maintenance, or upgrade access should not use public wifi without connecting through use the university provided VPN portal University sensitive or restricted data should not be saved on the Remote Host (External Access) Device At no time should remote users share login information or password with anyone Key Requirements

Information Security Working Group Privileged User Standard Overview Only granted to employees who: 1) Need it in order to perform their job responsibilities and 2) Acknowledge that they have read, understand, and will comply with all applicable policy guidance and procedures 3) Agree to apply privileged access appropriately, respect privacy, protect institutional data, and enforce security and legal compliance Privileged users are responsible for permissions they grant as follows: Supervisors and administrators approving or granting privileged access are accountable for any abuse of privileged access if proper procedures were not followed when granting such access. Privileged users must not breach delegated trust by misusing privileges or failing to maintain a high professional standard. Key Requirements Privileged access, commonly referred to as supervisor, system administrator, admin, or root access, grants an individual non-standard elevated access to the resources and data to perform system / data administration job duties.

Information Security Working Group Recommendation Recommendation – Appropriate Use for Both Remote Access and Privileged User Activities The campus should adopt the proposed standards as guidance addressing the expectations and responsibilities associated with both Remote and Privileged access to University systems and data.

Instructional Technology Working Group Action Items Presenter: Susan Reese

Instructional Technology Working Group Student Lab Upgrades Recommendation #1 - Background/Findings Over 80 Labs are on campus today Since Labs have been upgraded using Student Success Fee money Upgrades have been prioritized based on computer lab student Enrollment and Age of computers A list of top twenty Rooms were Prioritized and reviewed this year by the committee for upgrades The $370-$400K SSF money is estimated to upgrade 9 of the 20 labs prioritized by the Instructional Technology Working Group this year.

Instructional Technology Working Group Student Lab Upgrades Recommendation #1 – Funding Recommendation LAB UPGRADECOST AG (30 machines)$37,500 CBA (37 machines)$46,250 CLASS (24 machines)$49,200 ENG (41 machines)$51,250 ENG (31 machines)$38,750 ENV (25 machines)$51,250 LIBRARY (42 machines)$52,500 LIBRARY open (53 machines)$66,250 SCI (6 machines)$7,500 TOTAL: 290 machines$400,450

Instructional Technology Working Group Student Lab Upgrades Recommendation #1 – Schedule & Milestones March Confirm lab locations and priorities with colleges March/April Purchase Lab equipment June through August – Build and deploy lab equipment All equipment will be installed prior to the start of Fall Term

Instructional Technology Working Group Student Lab Upgrades Recommendation #1 – Risks Equipment delivery or vendor delays Structural or facility constraints, desks won’t fit equipment properly, may need new ways to mount/secure Equipment may not meet the functional expectations of faculty Lab availability or access restrictions for installations

Instructional Technology Working Group IT Contingency Money Recommendation #2 - Background/Findings What would we do with extra money in Classrooms and Lab support areas? Asked to provide a plan for $100K, $200K and $300K Prioritize money for Classroom and Lab upgrades equally Provide equipment to Classroom Support staff for Research and Development that would double as backup equipment for Classroom failures.

Instructional Technology Working Group IT Contingency Money Recommendation #2 - Funding Recommendation Split the money 50/50 between Classrooms and Labs For Classrooms 40% will be designated for Classroom upgrades of rooms that have minimal technology installed 10% Designated for the Classroom Staff to have R&D Equipment that would double as backup equipment for the classrooms For Labs Money would be used to upgrade as many labs as possible on the 15/16 Lab priority list Extra money that can not fund a full upgrade to a classroom or lab would be put towards (1) Analog to Digital Conversion project or (2) towards R&D equipment for the classroom staff

Instructional Technology Working Group IT Contingency Money Recommendation #2 – Schedule & Milestones March Confirm Classroom and Lab equipment to be purchased March/April Purchase equipment June through August – Build and deploy equipment All equipment will be installed prior to the start of Fall Term

Instructional Technology Working Group IT Contingency Money Recommendation #2 – Risks Equipment delivery delays Equipment may not meet the functional expectations of faculty Unavailability of equipment training opportunities or resources Vendor service constraints (classrooms) New equipment integration into older/current classroom system Classroom availability or access restrictions for installations