Software Asset Management (SAM) The ITS / CLO Partnership in SAM Implementation By Fleming Woo Chief Computing Officer Information Technology Services.

Slides:



Advertisements
Similar presentations
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
Advertisements

PCard Program Roles and Responsibilities Review Karen Brookbanks, C.P.M., CPPB.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
COPYRIGHT NOTICE: This presentation contains copyrighted and/ or trademarked material the use of which has not always been specifically authorized by.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Software Asset Management (SAM) ITS Offsite Workshop 2002 November 8, 2002.
IT Governance and Management
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Software Asset Management (SAM) ITS Offsite Workshop 2002.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Introduction to Intellectual Property using the Federal Acquisitions Regulations (FAR) To talk about intellectual property in government contracting, we.
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Management Information Systems: Classic Models and New Approaches Chapter 17.
High-Level Assessment Month Year
VISD Acceptable Use Policy
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Miami University Fall 2009 Software Asset Management.
Software Asset Management
Jiahuan Liu MGQ B7. Definition A copyright provides legal protection to a written or an artistic work Protected work may include images, symbols, novels,
INTERNET and CODE OF CONDUCT
ZHRC/HTI Financial Management Training
Software Asset Management Morris Ng Software Asset Management Compliance Officer (SAMCO) Office of Information Technology and Services.
International Civil Aviation Organization FAOSD Programme Administrative and Programme Participation Terms & Conditions Roles and Responsibilities.
Peer Information Security Policies: A Sampling Summer 2015.
Best Practices for Documenting Software Licensing Compliance Presented By Mike Ludwig and Peggy Fish.
KNOWLEDGE MANAGEMENT TEAM. KM Skills in General 1. Time management → to acquire knowledge 2. Learning technique → to absorb knowledge 3. Networking skill.
Other Laws (Primarily for E-Government) COEN 351.
Software Piracy and Copyright Considerations Laura Larsson Research Librarian Health Services University of Washington revised October 21, 1998
ICT Standards and Guidelines Findings and Recommendations B. Chatterjee Chief Technology Officer, CNSI.
Development, Marketing, Licensing, and Distribution.
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ICT Standards and Guidelines The Structure of the Project Akram Najjar CNSI – Senior Consultant Director of InfoConsult.
Chapter 8 Selecting and Maintaining Digital Resources.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
NIH Funding Recipient Responsibilities February, 2004 Office of Technology Transfer Office of the Director National Institutes of Health.
Copyright and the Law For more information contact:
Software Licensing. Software License  Software Licenses are agreements between the user and the software developer.  The user accepts this agreement.
Addressing Unauthorized Release of Personal Information at UC Davis August 12, 2003.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
State of Georgia Release Management Training
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Computer Technology Timpview High School
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Copyright and the Law Your Name Goes Here.
Educational Software Issues. Copyrights This protection is available to both published and unpublished works.
REPUBLIC OF ALBANIA PUBLIC PROCUREMENT AGENCY Eighth Regional Public Procurement Forum May, 22-25, 2012 Tirana
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Health & Safety Management “and a few other things for your consideration”
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
P1 - Software licenses. Different types of license and software Single-user license Multi-user license Proprietary software Freeware Shareware.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
Computer Software Heather Allen. Software Copyright Laws It is illegal for anyone to violate any of the rights provided by the copyright law to the owner.
PROGRESS IN IMPLEMENTING e-GOVERNANCE
Software piracy and software patents
Soft Law in China’s regulation of the Internet
IS4680 Security Auditing for Compliance
Computers Tools for an Information Age
Database Administration
Computers Tools for an Information Age
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Computers Tools for an Information Age
Strategies for Information Management
Student Name Student Class
Presentation transcript:

Software Asset Management (SAM) The ITS / CLO Partnership in SAM Implementation By Fleming Woo Chief Computing Officer Information Technology Services Office

The role of CLO Follow the PolyU SAM policy and guidelines Assume leadership in the department – Advise departmental staff – Ensure use of legal software – Report violations

SAM measures - Education Observe SAM procedures and guidelines in departments Advise departmental users that only authorized software should be used Obtain technical assistance and guidelines for implementing SAM from ITS

SAM Measures - Monitoring Maintain an up-to-date departmental software inventory Lead periodic software scan exercise with the SAM tool Reconcile the number of installed software against the number of purchased licenses Monitor progress of SAM implementation in the department

SAM measures – Action against violation When unauthorized software is found, advise user to acquire license or to remove it Report repeated non-compliance to Head of Department

The Role of ITS In collaboration with CLO, advocate and promote SAM to all staff Assemble and disseminate up-to-date information about SAM Devise general guidelines and procedures Provide tools and help service Assist users in the SAM implementation Monitor overall progress

Good Practice Do not install unlicensed software Do not share or distribute software without a license to do so Do not download copyrighted software without the consent of the owner Study the conditions of the license before installing, including shareware and freeware Make sure your PCs are secure against unauthorized access

Good Practice (cont.) License right is only the right to use Users of licensed software do not have the same rights as the owner S/he should not : – Modify the software – Re-engineer the software such as decompile and redevelop the software – Distribute the software

Some Useful References “Frequently Asked Questions – Amendments to the Copyright Ordinance”  Intellectual Property Department - Publication ublication.htm Government of the HKSAR –Software Asset Management

Some Useful References (cont.) Bilingual Laws Information System Microsoft website relevant to the US Copyright Law Business Software Alliance website:

Software Asset Management Q & A