Data, Policy, Stakeholders, and Governance Amy Brooks, University of Michigan – Ann Arbor Bret Ingerman, Vassar College Copyright Bret Ingerman 2004. This.

Slides:



Advertisements
Similar presentations
Cyber Security Haunted House: Creating a New Approach to Reach Students Kenneth Janz Director, Center for Instruction, Research, and Technology Indiana.
Advertisements

CHECK 2012 Bridging the Gap for Mobile Devices: Eager Adoption v. Practical Support Emporia State University The Faculty & Staff Support Perspective Cory.
Culture Change: What IT Takes to Create a Quality Customer Service Environment Presented By: Anne Agee, Executive Director, Division of Instructional and.
Copyright Kathy J. Lang and Ed Mahon, This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Technology Across the Curriculum Programs Keys to Success Beth Secrist, TAC Coordinator Copyright Beth Secrist, This work is the intellectual property.
Campus Video Services Alliance: A Strategic Partnership and Its Effects Copyright Jim Duncan and Molly Langstaff This work is the intellectual property.
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Copyright 2008, Elizabeth A. Evans. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-
Copyright Policy Copyright Cathy O’Bryan This work is the intellectual property of the author. Permission is granted for this material to be shared.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
© Copyright Computer Lab Solutions All rights reserved. Do you need usage information about your computer labs? Copyright Computer Lab Solutions.
Linda Ricks Managing Director, Information Systems May 25, 2006 Project and Resource Portfolio Management.
Copyright John F (Barry) Walsh This work is the intellectual property of the author. Permission is granted for this material to be shared for non-
Evaluating a Mass Notification Service for Campus Wide Communication Lori Sundal Georgia Institute of Technology EDUCAUSE Southeast Regional Conference.
Worcester Polytechnic Institute 1 Providing Technology Orientation for New Faculty and Staff Copyright © 2005 Worcester Polytechnic Institute This work.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
February 2006 copyright Michael Welch, Blinn College This work is the intellectual property of the author. Permission is granted for this material to be.
Dialogue: Does the Cornell Policy Process Play in Peoria? David Stack, Ph.D. Deputy CIO University of Wisconsin–Milwaukee Merri Beth Lavagnino, M.L.S.,
Educause Security 2007ISC Information Security Copyright Joshua Beeman, This work is the intellectual property of the author. Permission is granted.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Implementing Administrative Systems? You need an Evolution, not a Revolution! UNIVERSITY OF WASHINGTON Copyright [your name] [year]. This work is the intellectual.
IT Strategic Planning From Technical Dreams to Institutional Reality
Chatham College Community and Computers Pervasive Computing at a Liberal Arts College Charlotte E. Lott, Ph. D. Lynda Barner West, Ed. D. Copyright Charlotte.
It’s All in How You “Sell” It Pay for Print vs. Print Conservation:
David Sweeney, Director Brooke Woodruff, IT Manager
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Jumping Into the Frying Pan Lessons learned deploying and supporting Sakai in a liberal arts environment Mary P. Glackin & Julie Habjan Boisselle Mount.
Why We Need It In a Small Residential College The Plan The Reality What We Hope to Accomplish What We Have Learned So Far Unexpected Benefits Statistics.
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Beyond the Campus Gates: Bringing Alumni, Parents, and Prospects into the Campus Portal William P. Wilson Mark R. Albert John C. Duffy Gettysburg College.
NERCOMP Managing Campus Affiliates Managing Campus Affiliates Faculty? Student? Faculty? Student? Staff? Criss Laidlaw Director of Administrative.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Building the Integrated Learning Center Having the right people at the table Chris Johnson, Senior Consultant for Learning Technologies University of Arizona.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Value & Excitement University Technology Services Oakland University Information Technology Strategic Planning Theresa Rowe October 2004 Copyright Theresa.
Pay for Print vs. Print Conservation: It’s All in How You “Sell” It © Kathy Gervasi and Bill Thieke, This work is the intellectual property of the.
The "How" and "Why" of a Large-Scale Wireless Deployment  March 3, 2004  EDUCAUSE Western Regional Conference Sacramento, CA Copyright Philip Reese,
If You Build It, Will They Come? A Software Implementation Becomes a Catalyst for Organizational Change CUMREC 2003.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
1 Top 10 Challenges of the Academic Technology Community John P. Campbell & Dennis A. Trinkle EDUCAUSE Live! Monday, May 21, :00-2:00 PM Copyright.
Advice for IT Leaders By Don Harris Vice Provost and CIO Emory University.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
University of Southern California Identity and Access Management (IAM)
SupportU 24x7: Implementing and Maintaining a Co-Managed Help Desk
Jill Forrester and David Kelly| October 20, 2011
Federated Identity Management at Virginia Tech
Walking the Line Between Customer Service and Customer Codependency
Julian Hooker Assistant Managing Director Educause Southwest
"Copyright Mary Ann Gawelek, Philip Komarny & Mary Spataro, 2012
Adapting Enterprise Security to a University Environment
Decentralization in a Centralized IT Environment
Copyright Information
IT All Staff M. Mundrane 16 March 2018.
Blaine A. Brownell, President,
University of Southern California Identity and Access Management (IAM)
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Presentation transcript:

Data, Policy, Stakeholders, and Governance Amy Brooks, University of Michigan – Ann Arbor Bret Ingerman, Vassar College Copyright Bret Ingerman This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Bret Ingerman Vice President for Computing and Information Services Vassar College Poughkeepsie, NY

Here to represent the small schools (under 5,000 FTE) EDUCAUSE Small College Constituent Group

Vassar College Founded 1861 Highly selective, residential, coeducational, liberal arts college 2,475 students –95% live on campus 240 tenure track faculty 680 staff

Vassar College 7,000+ devices on network –4,000+ computers –80 + central file servers –??? Distributed servers All major operating systems (win, mac, unix) SunGard / SCT Banner (on Oracle) Central IT staff of 45

Small isn’t always small

“IdM Stone Age” “Authorization: The Early Years” “[some implementations] Not too fancy, but it does the job.”

20,000 foot view

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

“Most campus constituencies are unaware of identity management systems…” True for non-IT staff Also true for some (many?) IT staff –Though may not know it is called this –Many (most?) campuses engage in this… Small schools usually don’t attend these types of sessions –What size are your institutions?

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Policies?

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Policies.

Policies?Policies. We have surprisingly few IT related policies –We have surprisingly few policies in general! Not even sure the process to approve policies –Strong faculty governance for faculty policies –Negotiations for union policies –Fiat for students –??? for staff

“Policies should drive how identities are disseminated.” Ideally… …but that’s not how it works –at small schools –at large schools, too? Small schools depend less on policies… …and depend more on people …and on practices

Policies “We’re a small college, not a university” –“We’re a small university, not a big university” –“We’re a private/public university, not a public/private one” –“We’re a university, not a corporation” –“We’re a local corporation, not a huge multi-national one” –Etc.

Policies Phone calls and casual conversations How do we bring rigor to this? Should we bring rigor to this? Is this the “small school way” ? An example…

Adding Accounts How many have a formal policy on this? –How many of you are at large / small schools? How many don’t? –How many of you are at large / small schools? What is the policy Of those with a policy… –How many will also accept phone requests? –Never? –For new faculty (superstar researchers), or senior admin. ?

Adding Accounts How do you disseminate new credentials? –In-person – –Phone For those who said “no” to or phone –Are you sure? –Are you really sure? –Have you tried calling your Help Desk to see?

Policies For me (read “small schools”): Policy less important then practice… …initially Reason to want to change practice –Within IT, fiat may be acceptable / necessary –Externally will take conversations Encourage, reward, nurture the changes

Policies and Governance With strong faculty governance: Easier to change practice than policy –Mostly internal Next, document the successful practice –Write internally –Share externally

documented practice = de facto policy

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Stakeholders All the usual players False sense that because we are small… …we either own all the data, or …we know everyone that owns data We would be wrong

Stakeholders We don’t think about: –Dean of Faculty office (faculty contracts & salary) –Security (parking information) –ID Card office (one-card info, door access, photos) –Health Services (medical records) –Others? Small size may make actually make it harder to identify all sources

Who are some of the more “unique” stakeholders on your campus?

Stakeholders Do the stakeholders feel ownership? –Data “managers” vs. data “custodians” Do you have a “stakeholders” committee? –BISC

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Communicating the Importance One place where small may be an advantage Centralized administration Decisions (relatively) easy to push out –Once made… Although not always the case –Even some small schools are “federated” –“Common Services”

Communicating the Importance Main focus for me is on IT staff Need them to see the value of IdM Need them to see it as important Need them to see it as more important

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Decision Making Small schools –Frustrating at best –Non-existent at worst Large schools –Frustrating at best –Non-existent at worst To put it into perspective…

A vote of 7 to 1 is a tie 1

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions. Data

Who has it? –Where are the authoritative sources? –How do you know they are the authoritative source? –Do they know they are the authoritative source? How up-to-date is it? –How do you remove people from “the system”? –Have you audited it? How secure is it? –ImageNow…

Abstract Most campus constituencies are unaware of identity management systems, yet because of their broad impact campuses must define new policies or update old ones. Who are the stakeholders, and what strategies can institutions use to communicate the importance of identity management to them so appropriate decisions can be made? What types of policies are affected by identity management implementations? This session will provide answers to these critical questions.

…provide answers to these critical questions.

…provide critical questions to these answers. …provide answers to these critical questions.

There are no right (or wrong) answers. There are no easy answers.

Thank you!

Questions?