New Data Access Model – Briefing for Internal Audit Personnel 12/15/20081New Data Access Model Pat Burns, VP for IT Thom Hadley, Dir. of Fin. & Strategic.

Slides:



Advertisements
Similar presentations
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Advertisements

Fe Angela M. Verzosa1 Records Retention 2 determining the length of time that the records should remain in the originating office usually influenced.
DEPARTMENT OBJECTIVES 1. To Identify and deploy information technology to meet business objective at CKPL. 2.To Provide support to users for systems usage.
Management Accounting. The Functions of Management Planning Acting Controlling Feedback.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
FY2011 Other Education and General Program Accounts OVERVIEW OF “E” FUNDS.
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
Database Administration
SAP R/3 Materials Management Module
Management Control Systems
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
Institutional Research and Planning Reporting and Data Governance Strategy.
SAS 112: The New Auditing Standard Jim Corkill Controller Accounting Services & Controls.
Institutional Memberships November Institutional Memberships New Operational Guideline: Memberships Paid by University Funds can be found at
10/5/1999Database Management -- R. Larson Data Administration and Database Administration University of California, Berkeley School of Information Management.
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
DATA GOVERNANCE: Managing Access Jeremy Singer Suneetha Vaitheswaran.
Peer Information Security Policies: A Sampling Summer 2015.
The Strategic Role of Human Resource Management
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Pat Burns, VP for IT 11:00 – 11:50 AM January 7, 2010.
Welcome to UShop!. Sub 70% contract compliance Paper-based Inefficient Not transparent Dysfunctional vendor management $70M annual Pcard spend that requires.
Agenda 1. Definition and Purpose of Data Governance
Foundation Financial Services Post Award Nancy Gomez Post Award Analyst.
An Educational Computer Based Training Program CBTCBT.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Module Title? DBMS Introduction to Database Management System.
Responsible Conduct of Research (RCR) Farida Lada October 16, 2013
UNM and Health System Internal Audit Departments Internal Audit Department Orientation Manu Patel, Internal Audit Director Purvi Mody, Executive Director,
Clinical Management for Behavioral Health Services (CMBHS)
Information Systems Development. Outline  Information System  Systems Development Project  Systems Development Life Cycle.
Roles and Responsibilities
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
JPMorgan Chase Purchasing Card Program Executive Summary.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
TAMUCC EPA SECURITY Security Training for Users of Canopy for Creation and Approval of Payroll Documents.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
“Surviving an Audit” Al Willie, Office of Internal Audit
“Surviving an Audit” (or: Everyday things you can do that will both improve sponsored project management AND reduce audit findings) Al Willie Office of.
Controller’s & Bursar’s Offices Mission Support College operations: Collect funds (e.g., tuition & fees, grants, and State appropriations) Pay bills (e.g.,
Slide 2-1 Chapter 2 Information Systems in Organizations Introduction to Information Systems Judith C. Simon.
Financial Management of Sponsored Awards: Confessions From A Department Administrator.
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
Database Systems Lecture 1. In this Lecture Course Information Databases and Database Systems Some History The Relational Model.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
Management Information System
Careers in Distribution, Copyright 2005, WERC Careers in Distribution Management Jobs.
 An Information System (IS) is a collection of interrelated components that collect, process, store, and provide as output the information needed to.
Chapter 8 Auditing in an E-commerce Environment
BGSU/PeopleSoft Introducing Financial Management Solutions & Enterprise Performance Management.
Clinical Research Coordinator Fundamentals Course Remuneration (Clincard) Laura Vinci, RN, MBA Senior Director of Operations Jefferson Clinical Research.
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Information Technology Assessment Findings Presented to the colleges of the State Center Community College District.
Hudson International - Regional Operations Director Purpose Reporting directly to the Regions COO and supporting the Hudson International Area Director,
IT Jobs Positions available in the field of Information Technology.
Database Administration Advanced Database Dr. AlaaEddin Almabhouh.
The Medical College of Georgia HIPAA Privacy Rule Orientation.
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Shared Services and Third Party Assurance: Panel May 19, 2016.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Budgeting and financial management
Module Overview Installing and Configuring a Network Policy Server
IS4680 Security Auditing for Compliance
Doing Business with the Business Office
Presentation transcript:

New Data Access Model – Briefing for Internal Audit Personnel 12/15/20081New Data Access Model Pat Burns, VP for IT Thom Hadley, Dir. of Fin. & Strategic Srvcs, CVMBS Don Hesser, Director of IS Ken Johnston, Assoc. Director of IS

Business Intelligence Analyzing pertinent data in an appropriate format, to inform decisions that result in improved business management A strategic imperative that must be balanced against privacy and IT security concerns ◦ A ‘hot’ topic at the spring 2008 strategic planning meeting 12/15/20082New Data Access Model

Data Access - Distinction Official System of Record reporting – Institutional Research and Systems of Record functional units ◦ Maintain ‘business as usual’ Business Intelligence – individuals in units throughout the University ◦ This is the focus of today’s discussion 12/15/2008New Data Access Model3

Current Data Access Model Apply for access, using a hardcopy form ◦ Approval of department head ◦ 4 central signatures required, usually with very little direct knowledge of need  SIS, HR, ACNS (eID), and IS (implementation)  Currently, there are in excess of 1,600 individuals who have access to massive amounts of central data After access is authorized, typically ◦ Large data sets are downloaded to local storage and manipulated thereafter 12/15/20084New Data Access Model

Current Data Access Model We manage access to our data ◦ Need is generally not questioned during the application process ◦ Annual review of access privileges is conducted by department heads We do not do a good job of managing users’ behaviors associated with data access ◦ A significant vulnerability 12/15/2008New Data Access Model5

Proposal for a New, Managed, Decentralized Model for Data Access Institute a new, improved, ‘managed decentralized’ model for ◦ Granting access to University data and ◦ Managing users who have access to University data 12/15/20086New Data Access Model

Elements of the New Model Centralized data repositories/services ◦ eThority ◦ ODS System of Record Data Stewards (DSs) ◦ Define data access privileges Data Access Managers (DAMs) ◦ One per VP/Dean (more if specifically needed) Data Users (DUs) Coordinated by the VP for IT 12/15/2008New Data Access Model7

System of Record Data Stewards For each System of Record, Data Stewards (or designates) will define data elements and scope: ◦ Default data – access can be granted to data users by Data Access Managers (DAMs) ◦ Protected data – DAM must petition DS for access by Data User (DU) ◦ Private data – data not to be shared, e.g. SSNs, CCN’s, etc. 12/15/2008New Data Access Model8

Data Access Managers Understand need for data access ◦ Brief Data User on proper behaviors ◦ Obtain signature on data access application Approve access to default data Petition for access to protected data Coordinate training and communications Recognize and communicate changes in roles that would trigger a reevaluation of access privileges Refer inappropriate behavior to department head, Data Steward, and VP for IT 12/15/2008New Data Access Model9

A Specific Example College Business Officer (CBO) is trained and trusted ◦ CBO has access to all college data CBO grants default, partitioned access to department level analysts ◦ Department-level analysts authorized to view only their unit’s data ◦ Department-level analysts who desire access to ‘protected’ data must be authorized by CBO and then system’s Data Steward 12/15/2008New Data Access Model10

Oracle or SQL– Data Mart eThority or ODS Data Data Users Data Feeds - Examples 11New Data Access Model Financial HR ResearchFoundationPurchasingSIS Data can be partitioned at any level of granularity Authorization can be distributed at any level of granularity 12/15/2008 Database & Database Server eThority or Oracle Discoverer Web Access Internet

ETHORITY - FRAMEWORK - BETA TRIAL - STEADY-STATE MODEL 12/15/2008New Data Access Model12

Current Data Feeds to the eThority Data Mart Financial Information Financial Transactions (2003 – Present) Financial Summary by Account (1992 – Present) Foundation Summary by Account Human Resources Employee Demographics Data Employee Restricted Data (Salary, DOB, Gender, etc) Research Pre-Proposal Grant Information Proposal Grant Information Funded/Approved Grant s Purchasing Vendor Information SciQuest Invoice Header Information SciQuest Invoice Detail Information Student/Class Course Catalog Class Demographics (Enrollment, Instructor, etc) Clinical Procedures (1992 – Present) Invoice Information (Payments, Credits, Transfers, etc) Inventory (Pharmacy and Central Supply) 12/15/200813New Data Access Model

Proposed Beta Trial for eThority The College of Veterinary Medicine and Biomedical Sciences will host the system on CVMBS servers (security approved by ACNS) Access to data will be authorized by the data custodians for each individual participating in the beta test Training and support will be provided by the College of Veterinary Medicine and Biomedical Sciences The beta test will be conducted for at least six months 12/15/200814New Data Access Model

Steady-state Model for eThority Servers will be in secure, main data facility, behind the administrative systems’ firewall ACNS/IS will operate and manage ◦ The firewall, hardware, OS & DB ◦ Data feeds, in cooperation with CVMBS CVMBS will operate and manage ◦ Data feeds, in cooperation with IS ◦ The application ◦ Training users ◦ Supporting users 12/15/2008New Data Access Model15

Current Approach Parallel projects ◦ eThority beta trial ◦ Oracle Discoverer access to IS’ central data warehouse We feel both will be beneficial to the institution, and we need to gain additional experience with both approaches to determine a model for user access to each system 12/15/2008New Data Access Model16

IA Feedback Solicited We seek IA’s approval for the concept of the new data access model ◦ We request IA’s participation as we ‘flesh out’ additional details  Policies, procedures and operations Any concerns with the Current Approach? ◦ eThority beta trial ◦ Oracle Discoverer access to central data 12/15/2008New Data Access Model17