EMerge Status Report COIT September 18, 2008. 2 Description Deploy a Human Resources Information System using a secure and robust technical platform for.

Slides:



Advertisements
Similar presentations
Planning Collaborative Spaces in Libraries
Advertisements

Series 2: Project Management Understanding and Using 6 Basic Tools 9/2013 From the CIHS Video Series “Ten Minutes at a Time”
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3.1.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
IT Governance and Management
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
OHIO OFFICE OF INFORMATION TECHNOLOGY. Even the agents are suffering…
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 10 Managing the Delivery of Information Services.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Session 3 – Information Security Policies
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Chapter 9. Intro  What is Project Management?  Project Manager  Project Failures & Successes Managing Projects  PMBOK  SDLC Core Process 1 – Project.
Strategic Objectives 2011 January 14, Growth of Aligned Programs ObjectiveAccountabilityProcessOutput/ Outcome Status Report Enhance and expand.
May Agenda  PeopleSoft History at Emory  Program Governance  Why Upgrade Now?  Program Guiding Principles  High-Level Roadmap  What Does This.
ISA 562 Internet Security Theory & Practice
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Financial Systems Needs Assessment Administrator Briefing Spring Quarter 2009.
Chapter 11. Intro  What is Project Management?  Project Manager  Project Failures & Successes Managing Projects  PMBOK  SDLC Core Process 1 – Project.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Business Continuity Program Orientation (insert presentation date) (This presentation is a template that requires adjustments to meet your needs)
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture b This material (Comp7_Unit7b) was developed by.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Working with HIT Systems
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
PUBLIC–PRIVATE PARTNERSHIP (PPP) FRAMEWORK AND GUIDELINES Syed M. Ali Zaidi, P.Eng. PM(Stanford), Ph.D. Director, Strategic Partnerships Alberta Infrastructure.
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
IS3220 Information Technology Infrastructure Security
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Cyber Security of SCADA Systems Testbed Development May1013 Group Members: Ben Kregel Justin Fitzpatrick Michael Higdon Rafi Adnan Adviser: Dr. Manimaran.
Create a system that reflects higher education best practices
Chapter 11 Project Management.
Project eMerge Status Update
Presentation to the COIT Architecture Sub-Committee
Managing the Delivery of Information Services
Cybersecurity Policies & Procedures ICA
Introduction to the Federal Defense Acquisition Regulation
Information Technology (IT) Department
Continuity of Operations Planning Introduction & Practical Application – PART TWO Kelly Keenan, MPH May 14, 2015.
Chapter 3 Managing the Information Systems Project
Description of Revision
Leadership Team Kickoff
STATE OF NEW MEXICO STATE PERSONNEL OFFICE (SPO)
Environmental Public Health Tracking (EPHT)
#IASACFO.
SIS Modernization project
Final HIPAA Security Rule
IS4550 Security Policies and Implementation
GENERAL SERVICES DEPARTMENT Facilities Management Division PROOF –NM (Process Reengineering & Optimization of O&M Functions for New Mexico) Phase II.
Enterprise Cybersecurity Upgrade Initiation Department of Information Technology Maria Sanchez, Acting State CIO November 13, 2018.
Department of Licensing HP 3000 Replatforming Project Closeout Report
Website Content Management System (CMS)
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Project Management Chapter 11.
HIPAA Security Standards Final Rule
Ctclink executive leadership committee May 31, 2018
DSC Contract Management Committee Meeting
Executive Project Kickoff
{Project Name} Organizational Chart, Roles and Responsibilities
SHARE Special Project Enterprise Learning Management Pilot Project Planning/Implementation Certification December 17, 2014 Requesting Agency: Cassandra.
July 22, 2015 Sally Trigg, DoIT, Project Manager
GENERAL SERVICES DEPARTMENT Facilities Management Division PROOF –NM (Process Reengineering & Optimization of O&M Functions for New Mexico) Project.
Office of the New Mexico Secretary of State Business Filing System – Phase 2 Change Request Presented to the DoIT Project Certification Committee June.
Presentation transcript:

eMerge Status Report COIT September 18, 2008

2 Description Deploy a Human Resources Information System using a secure and robust technical platform for mission critical systems that: Integrates core business systems Eliminates manual and redundant business processes Provides enhanced services to active, retired and potential workforce

3 Accomplishments Awarded implementation partner contract – Ciber, Inc. Acquired PeopleSoft HCM and non-production environment Hired 24 FTE – actively recruiting 5 technical positions Launched project website – Completed high-level business process analysis Commenced implementation Phase I Created CCSF / Ciber Project Charter Completed first round functional training

4 Project Health Summary Project Attribute Deliverable PlannedActual Status StartEndStartEnd Schedule Infrastructure Build Out - Pre- Production Environments 01/01/0805/15/0801/01/08 Schedule Fit Gap Sessions 05/01/0807/31/0808/18/08 Schedule Policy Analysis - Charter, Admin Code, Civil Service Rules, MOUs 06/23/0810/31/0806/23/08 Schedule Department Head Meetings - Project Goals & Alignment 9/22/0810/31/08 Schedule Determine Operational Support Structure 6/30/089/30/086/30/08 Schedule Plan Showcase Event 04/14/08 07/01/08 Schedule Conduct remote time entry device analysis 08/26/0812/31/088/26/08 G G G G R Y R

5 Project Health Summary cont’d Project Attribute StatusComments Overall Schedule Projected Phase I go-live – 10/31/2009; evaluation of included functionality for Phase I will be necessary ScopeIncrease in scope due to Disaster Service Work Program requirements CostFY2007–2008 expenditures within approved budget Overall Y G Y Y

6 Issues & Risks Risk DescriptionTriggersHigh Level Mitigation Plan Impact - Cost, Scope, Time City Computer Hosting Center relocation from OMP to an undetermined location Timing of move conflicts with planned project go- live Adjust project schedule Time, Cost Potential inability to maintain enterprise level infrastructure – i.e. network inter-connectivity, application security, control and standardization Central IT develops operational support plan that exposes vulnerabilities in network and data security, interconnectivity and business continuity Develop a strong partnership with IT and partner in developing standards, i.e. Service Level Agreements, training Scope, Time, Cost City leadership are unable to define and agree to a viable operational support structure for the PeopleSoft system Politics Layoffs Budget deficit Union resistance Work with Executive Steering Committee to define and agree on an operational structure Scope, Time, Cost

7 Issues & Risks cont’d Risk DescriptionTriggersHigh Level Mitigation Plan Impact - Cost, Scope, Time May not be able to implement functionality that requires electronic signatures, i.e. employment applications City does not have a sanction or precedent that defines use of electronic signatures Work with Executive Steering Committee, Civil Service Commission, and City Attorney to define City policy Scope, Time End user concerns about security and confidentiality Media and external events Data breach Union resistance Encrypt sensitive data, limit access to info on reports, limit use of SSN, work with COIT to create a City wide policy stopping the use of SSN Scope