Licensing Division Reengineering Project Requirements Workshop Copyright Owners 1/26/2011.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

EWU On-line Application Tutorial. Online Employment System Training for Eastern Washington University Applicants This presentation will take approximately.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
EPermits IT Subcommittee Meeting September 6, 2013.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Licensing Division Reengineering Project Requirements Workshop Copyright Filers 2/14/2011.
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
EAYSO. 2 Player Registration Volunteer Registration Invoicing/Payments Financial Reporting Team Management Game and Referee Scheduling Player Rosters.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Information Security Policies and Standards
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Fall 2009ACS-3913 Ron McFadyen1 Use Cases Used to capture functional requirements – there are other requirements categories such as usability, reliability,
Gathering Information and Use Case Scenarios
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 Welcome to the Colgate University Online Employment System Applicant Tutorial.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
How to get your free Windows Store Access
Web services security I
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Introductions Jim Enzinna, Chief, Licensing Division Mark DiNapoli, Assistant Chief, Licensing Division Tracie Coleman, Head, Information Section Vince.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
Multimedia Communication and Information Logistics for AFTER-SALES AND PRODUCT LIFE- CYCLE SUPPORT Click to edit Master title style
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
Role of Account Management at ERCOT Market Participant Identity Management Overview (MPIM)
Secure Electronic Transaction (SET)
Information Systems Security Computer System Life Cycle Security.
1 Welcome to GE! The attached presentation has been put together to assist you in completing your required I-9 form through the use of our I-9 wizard.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1 Permits, Licenses and Inspections Regional Project Introductions: Home Builders & Remodelers Association of Cape Cod State Project Sponsor & Technical.
EWU On-line Application Tutorial. Online Employment System Training for Eastern Washington University Applicants This presentation will take approximately.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Cryptography, Authentication and Digital Signatures
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
© Mahindra Satyam 2009 Configuration Management QMS Training.
Scope Management Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall Chapter 5 Learning Objectives After completing this chapter,
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall o P.I.I.M.T o American University of Leadership Ahmed Hanane, MBA, Eng, CMA, Partner.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Explorer Renewal 1/2010 Explorer Renewal Updated 9/29/14.
Online Bid Submission in Bid4Michigan Screen Walk Tutorial Compiled by Christine Mitchell 1/4/2011.
Use Cases Use Cases are employed to describe the functionality or behavior of a system. Each use case describes a different capability that the system.
Dec UtilityAMI OpenHAN TF Requirements Working Group Specification Briefing January 2008.
DIGITAL SIGNATURE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Bidder Registration Process
Message Validation, Processing, and Provisioning System (MVPS) Access for Jurisdictions User has SAMS User ID Center for Surveillance, Epidemiology, and.
1 Addendum FALL 2004 RFP Detailed Instructions for Bidder Registration and Proposal Submission ENTERGY SERVICES, INC. November 2004.
An electronic phytosanitary certificate. Is NOT a copy of a printed phytosanitary certificate that is ed. Is a secured data set using XML for transmission.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Protection of Minors Program Coordinators Information Session November 2015 Carolyn Brownawell Melisa Giraldo Dietrich Warner.
Getting Started with. Before you register A valid address Course ID from your instructor Student access code Before you register, be sure you have:
How the ESign Act Makes Esignatures Work
U.S. EPA e-Manifest Program
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
INFORMATION SYSTEMS SECURITY and CONTROL
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Presentation transcript:

Licensing Division Reengineering Project Requirements Workshop Copyright Owners 1/26/2011

2 Agenda Welcome and introductions Project stage To-Be system discussion –Certification of documents (digital signature) –Conceptual model - To-Be System Break (12:00 PM – 1:00 PM) Requirements gathering – Use Cases Next steps Q & A

Functional Requirements Document As-Is Requirements To-Be Use Cases System Design System Configuration System Testing Build system System and user Translate use cases into system specification Convert functional requirements to usable format for system design Workshops by section to validate as-is state and map to functional requirements Detailed description of To-Be system requirements New Work Processes & Performance Measures Organizational Development Project Stage 3

Apply code Create unique hash/ ID of electronic document Apply digital signature Confidentiality Authorization Accountability Integrity Authenticity Non-repudiation Sign signature page Submit pages (non-secure) with signature page to LoC Only page authenticated is signature page Why E-Signature? Complete document is locked and verifiable

Electronic Signature Requirements Establishing the Participant’s Identity Establishing Consent Creating the Record Protecting the Signed Document 5

Digital Signature and Document Security AuthorizationAccountability Non- Repudiation AuthenticityIntegrityConfidentiality Digital Signatures Document Control Reference: ‘A primer on electronic document security’ Adobe Systems Inc

E-Signature Technology 101 Securing the Communication Two Factor Authentication Applying a Digital Signature 7

1. User Name + Password 3. Time Limited Key 4. Digital Signature LD System Certification Authority 2. Request Key Authentication Process 8

Signature Process Data is converted to pdf document A unique hash key is computed for pdf document User supplied key is used to encrypt the hash key The encrypted hash key is attached to the pdf document Document is digitally signed 9

E-Signature Technology Options Option Initial Cost Support Cost DeploymentSecurity SMSLow EasyHigh Virtual TokenMediumLowEasyVery High BiometricHighMedium High Error Rate Smart CardsMedium Vulnerable (1) USB TokenHighMediumEasyVulnerable (1) Digital CertificatesMediumHigh Tokens/FobsHigh EasyVulnerable (1) Notes: (1) Vulnerable to Theft, Loss or Fraud 10

SOA Lifecycle Timeline REMITTER OWNER Manage Data Prepare Pay Check SOA Status Manage Communications Approve Manage User Review Monitor SOA Status Produce Reports Submit Research Request SUBMISSION DEADLINE 11

12 Conceptual To-Be System

13 Monitor SOA Status Monitor SOA Status Produce Reports Submit Research Requests Monitor SOA Status The system provides information about where the SOA is in the LD examination and/or distribution process Conceptual To-Be System

14 Produce Reports The system provides a number of reporting options, including a data dump so copyright owners can perform their own analysis Conceptual To-Be System Monitor SOA Status Produce Reports Submit Research Requests Produce Reports

15 Submit Research Request Electronic correspondence between LD researchers and copyright owners. Conceptual To-Be System Monitor SOA Status Produce Reports Submit Research Requests

16 1.LD will offer online customer service. Specific customer service policies are still being developed. We are considering: a)Context-sensitive help b)FAQ c)Searchable knowledge base d)Integrated or electronic messaging To-Be System: Owners

17 1.What changes would Copyright Owners like to see surrounding Copyright Royalty Board ordered distributions? 2.Are the current LD records adequate for the needs of Copyright Owners? What additional reports or analyses would Copyright Owners like to be able to perform on the LD data? Are Copyright Owners interested in trending, comparisons between accounting periods, etc.? 3.What additional information or analysis capabilities would Copyright Owners like to see regarding investments? Questions for Owners

What Is A Use Case? Business Use Case –Describes the business process that is used by its actors (Ex: Examiner) to achieve a goal (e.g., Examine an SOA, Calculate Fees). System Use Case –Describes a system that automates a business use case, described at the system functionality level (e.g., create SOA) and specifies the function or the service that the system provides for the actor. Actors –Use case defines interactions of roles with the system to accomplish a goal. –Specifies a role played by a person when interacting with the system. 18

19 Steps to Create a Use Case 1.Identify activities from the As-Is Mapping / Organizational Development activities. 2.Decompose business activities into discrete use cases. 3.Identify roles (actors) required to accomplish each discrete activity. 4.Select an actor. 5.Define what that actor wants to do on the system. –Each interaction between the actor and the system is a use case. 6.For each use case, decide the Normal Flow of Events by actor. 7.For each use case, identify Alternate Flows by actor. 19

20 Unique ID Use Case Name Use Case DescriptionActor(s) Bus - 1Submit research request This use case begins when a copyright owner submits a research request to the LD. Copyright Owner Representative Bus - 2Request DART Access This use case begins when a copyright owner requests permission to view a copy of a DART SOA. The owner fills out a form and delivers it to the LD. Copyright Owner Representative Bus – 3Produce Report This use case begins when a copyright owner produces a report of a given set of parameters concerning SOAs and their status, past and present Copyright Owner Representative Sample Use Cases

Project Next Steps Complete and Validate Use Cases Baseline To-Be Use Cases Document High Level System Design and Architecture Document Report, User Interface, Data Requirements Design To-Be System Detailed Functions Buy and Configure COTS Product Document System Test Scenarios Document System Test Cases Test To-Be System 21

Copyright Owners Next Steps Share information with Copyright Owners Prepare to respond to LoC initiated processes: –Notice of Proposed Rule Making 22

The questions discussed during the Copyright Owners Workshop on January 26, 2011, and the answers to those questions, will be provided under separate slide. 23 Questions & Answers (Q&A)

24 Requirements Notes The functional and business requirements garnered from the workshop discussions will be provided under separate slide.