Record Level Security From Strategy to Implementation at Museum Victoria Donna Fothergill and Lee-Anne Raymond.

Slides:



Advertisements
Similar presentations
Boundless business Broaden your business horizons.
Advertisements

MvCIS - Forbes Hawkins – Copyright © 2004 Museum Victoria Forbes Hawkins Collection Systems Developer Museum Victoria - Melbourne, Australia Museum Victoria.
KS Authorization Weixia (Bonnie) Huang Feb 19, 2013.
Depends entirely on support from the user base Many technical issues still need to be resolved Long term development horizon Proposal for a Simplified.
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Profiles and User Permissions Presented by: Josh Mostyn Presented by: Josh Mostyn.
Running an EMu Help Desk Lee-Anne Raymond Museum Victoria 4th Australasian EMu Users Meeting 2005.
With Microsoft Excel 2007 Comprehensive 1e© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2007 Comprehensive.
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
NYBG + KE EMu The New York Botanical Garden + KE EMu Melissa Tulig Botanical Information Management.
Chapter 12 Creating and Using Templates. If you have already created and designed a page you like, you can use the layout and design for other pages in.
By Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson, Linda Lau, Jerri Williams Chapter 7 Advanced Forms and Reports 1 Copyright.
Instructions and Reporting Requirements Module 9 Electronic Reporting For Facilities March 2014 North Carolina Central Cancer Registry State Center for.
Experiences with implementing EMu at the Australian Museum. - Lance Wilkie (EMu Unit Manager).
Collections Management Natural History Museums Common Development A Natural History Example using Darwin Core Much talk of common development Concern over.
Transaction Pains Managing Object ‘Activities’ for Exhibitions and Conservation ‘Ursa’ Lee-Anne Raymond Collection Information Systems Museum Victoria.
Maintenance Modifying the data –Add records –Delete records –Update records Modifying the design –Add fields into tables –Remove fields from a table –Change.
Chapter 3: Data Modeling
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Title Slide without Picture Subtitle Presenter’s Name Presenter’s Title Organization,
Agenda 22 7.SharePoint Changes 8.Items & Lists 9.Files & Libraries 10.SharePoint & Office 11.Help 12.Wrap Up.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 Tools of Software Development l 2 types of tools used by software engineers:
Access Tutorial 3 Maintaining and Querying a Database
Basil Dewhurst, a/- Manager, Image Services Department | | Image management & KEEMu KEEMu User Group meeting.
Protect your data with Security John Ykema, Director of Sales & Marketing.
EMu and Archives NA EMu Users Conference – Oct Slide 1 EMu and Archives Experiences from the Canada Science and Technology Museum Corporation.
Collections Management Museums EMu 3.1 / 3.2 – New Features EMu 3.1 / 3.2 New Features Bernard Marshall Chief Technology Officer KE Software.
Collections Management Museums Record Level Security Brad Lickman KE Software.
Database Systems: Design, Implementation, and Management Ninth Edition
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. ACCESS 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 4 – Creating New.
Discovering Computers Fundamentals, 2012 Edition Your Interactive Guide to the Digital World.
An Investigation of Oracle and SQL Server with respect to Integrity, and SQL Language standards Presented by: Paul Tarwireyi Supervisor: John Ebden Date:
Marketing in Today’s Economy
Discovering Computers Fundamentals Fifth Edition Chapter 9 Database Management.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Collections Management Proposal for a Simplified Structure for EMu Chicago, Oct 2005.
Schools Module Additional Information Press F5 to maximise this presentation.
Roles 1. Your Role: End User End Users use Inside NCDOT and Connect NCDOT for basic browsing and reading Typical tasks can include: Open or download files.
What have we learned?. What is a database? An organized collection of related data.
NMNH EMu DAMS Integration Project Rebecca Snyder Smithsonian, NMNH.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS Instructor Ms. Arwa Binsaleh.
Lighting the way Ensuring the survival of news archives into the future Victoria McCargar, M.A., MLIS Senior Editor, Los Angeles Times Adjunct professor,
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
EMu Interface and the Web Clear identification of web fields for users and administrators Visual identifier of the web presentations in EMu, ie Collection.
CASE (Computer-Aided Software Engineering) Tools Software that is used to support software process activities. Provides software process support by:- –
Introduction to KE EMu
EMu in the NHM: A personal perspective Darrell J. Siebert Dept. of Zoology.
EBSCOadmin Overview Tutorial support.ebsco.com. EBSCOadmin is a powerful administrative platform that offers a wealth of options for customizing your.
AESuniversity User Tips & Tricks. Where to Search – NEW client 1.Quickest search for New Client is Demographics page in HOH Check field 2.Or enter Social.
Data Migration Training Page 1 KE EMu Data Migration
KE EMu Collection Management Training Page 1 KE EMu Collection Management Training
Visual Basic for Application - Microsoft Access 2003 Finishing the application.
GRM REGISTRY WEB ACCESS Archive Conversion using the Deeds Registry Archive System (DRACS) Afghan Supreme Court System Beta Release.
Lesson 3: Changing the Appearance of Worksheets. 2 Learning Objectives After studying this lesson, you will be able to:  Change the view of an Excel.
Leveraging Drupal to Move to a Distributed Authorship Model.
MSOffice Access Microsoft® Office 2010: Illustrated Introductory 1 Part 1 ® Database & Table.
Microsoft Excel Prepared by the Academic Faculty Members of IT.
Curating transitive verb to organize and choose the items in an exhibition at a museum or gallery transitive verb to organize and choose the items in a.
DataDirector 3.0 Permissions Enhancements. Permissions - Overview  A new robust, user-friendly system of permissions has been implemented within DataDirector.
KE EMu Cataloging Training Page 1 KE EMu for Cataloguers
Transportation Agenda 19. Transportation Your Role: Designer Designers organize SharePoint content and determine how to display that content Typical tasks.
Informer 5 Teams and Security Collaborate on, Secure, and Share Content PRESENTER: Tim Nicholson| Director, Informer Customer Services| April 21, 2017.
Project: Improving accessibility of digitally created archives
State Report Processing
Tools of Software Development
Marketing in Today’s Economy
Chapter 1 Database Systems
September 12-14, 2018 Raleigh, NC.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 8 Slide 1 Tools of Software Development l 2 types of tools used by software engineers:
Database Design Chapter 7.
Presentation transcript:

Record Level Security From Strategy to Implementation at Museum Victoria Donna Fothergill and Lee-Anne Raymond

MV Strategy Consider the security design currently in place. What does RLS do that is different? What do the users want? Uses for RLS at MV? Is RLS for Everybody/ Every situation after-all?

MV Security A range of security measures are used at Museum Victoria User permissions Data Partitions - Column access/default registry settings - Roles field in Parties - Repository field in MMR Tab switching Record Level Security

Data Partitions Column Access – Default Settings Department Discipline User

Data Partitions Parties Module Partitioned & Shared By Roles

Data Partitions MMR Partitioned By Repository and Registry security setting. Access is restricted to users and/or groups.

Tab Switching Reduce Access to sensitive information without RLS. This setting maintains a closed access to the record by reducing the tabs in display to one only hiding the rest using Tab Switch. Query tabs are still available. Only groups with permission will see the full record. All can still see this type of record exists. Only those with permission may see the full contents of records.

MV Strategy Consider the security design currently in place. What does RLS do that is different? What do the users want? Uses for RLS at MV? Is RLS for Everybody/ Every situation after-all?

What does RLS do that is different? rls can build on your existing user/group permissions by: providing the ability to restrict a group of records within a department/discipline allowing users to share ownership of records providing users with access to collections of records they would not normally have access to

MV Strategy Consider the security design currently in place. What does Record Level Security do that is different? What do the users want? Uses for RLS at MV? Is RLS for Everybody/ Every situation after-all?

What do the users want? Ability to partition data according to discipline or department Ability to share but control the content within their own records Ability to see and share another departments records

MV Strategy Consider the security design currently in place. What does RLS do that is different? What do the users want? Uses for RLS at MV? Is RLS for Everybody/ Every situation after-all?

Uses for RLS at MV? Taxonomy Transactions Exhibition Objects Restricted and Secured Groups of Records e.g.Culturally Restricted artifacts Integrating systems to share assets e.g. Digital Asset Management System Relax a restriction

Uses for rls at MV Taxonomy module – open and with permission to do anything at all until… RLS Taxonomy is still open but security refined. Editing and Deletion locked where needed

Uses for RLS at MV? Taxonomy Transactions Exhibition Objects Restricted and Secured Groups of Records e.g.Culturally Restricted artifacts Integrating systems to share assets e.g. Digital Asset Management System Relax a restriction

Uses for rls at MV Transactions Module RLS To share & control from the outset.

Uses for RLS at MV? Taxonomy Transactions Exhibition Objects Restricted and Secured Groups of Records e.g.Culturally Restricted artifacts Integrating systems to share assets e.g. Digital Asset Management System Relax a restriction

Uses for rls at MV Exhibition Objects Module Triage Access Permissions

Uses for RLS at MV? Taxonomy Transactions Exhibition Objects Restricted and Secured Groups of Records e.g.Culturally Restricted artifacts Integrating systems to share assets e.g. Digital Asset Management System Relax a restriction

Uses for rls at MV Culturally restricted – records hidden to all but a few Tab Switch Controlled & Shared or Hidden

Uses for RLS at MV? Taxonomy Transactions Exhibition Objects Restricted and Secured Groups of Records e.g.Culturally Restricted artifacts Integrating systems to share assets e.g. Digital Asset Management System Relax a restriction

Uses for rls at MV Digital Asset Management System (DAMS)

Uses for RLS at MV? Taxonomy Transactions Exhibition Objects Restricted and Secured Groups of Records e.g.Culturally Restricted artifacts Integrating systems to share assets e.g. Digital Asset Management System Relax a restriction e.g. DNA Laboratory Data

Challenges Implementing significant change within a functioning environment Grouping data into Departments/Disciplines in preparation of setting rls on existing records Loosening security in order to tighten security Ensuring that rls is set correctly when a new record is inserted Hiding records - is this the best option?

Benefits Users evolving into more sophisticated sharers Cultural shift to more open attitudes towards data access Significant user satisfaction with a more flexible and secure data model Security significantly improved or made more robust Ability to utilise RLS to assist with integration projects such as the MV DAMS Promoting the sharing of data between disciplines

MV Strategy Consider the security design currently in place. What does RLS do that is different? What do the users want? Where is RLS needed? Is RLS for Everybody/ Every situation after-all?

Is RLS for Everybody/Every Situation After All? RLS is not for every situation. Each unique EMu site will have its own challenges. RLS is useful and can help but not solve all your access and restriction issues. A solid structure to begin with will support your implementation of RLS