Data Governance Data Architecture Data Development Database Operations Data Security Management Referene & MDM DW & BI Document & Content Mgmt Meta.

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Structuring a reporting environment for success.
Advertisements

University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
ERP Applications Selection in a Changing Marketplace Evaluation of Software Providers for Midsize Institutions Bill Reed Director, Special Projects Northern.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Derreck Pressley – Seattle University  Founded in 1891 in Seattle, WA  Jesuit Catholic institution  7,800 students within seven schools/colleges,
Data Ownership Responsibilities & Procedures
Data Incident Notification Policies and Procedures Tracy Mitrano Steve Schuster.
1 MAIS Student Administration Advisory Group Meeting #31 October 4, 2006.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
OHIO OFFICE OF INFORMATION TECHNOLOGY. Even the agents are suffering…
What kinds of Information do you carry?? Have you ever heard about Ubiquitous Society??
Data Security Overview ORSP Staff AT Desktop Service Team November 18th, 2014.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Raj Bank Universal Core Banking System FCBS LabsInnova Info Technology Ltd. Banking Systems & Consulting
Mainstreaming the Environment Across DFID’s Work ENVIRONMENTPOLICYENVIRONMENTPOLICY.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Intranets Lessons from Global Experiences J Satyanarayana Chief Executive Officer National Institute for Smart Government Hyderabad, India.
Peer Information Security Policies: A Sampling Summer 2015.
Learning with a Purpose: Learning Management Systems Patti Holub, Director District Initiatives and Special Projects Miguel Guhlin, Director Instructional.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Adelina Rucker EDLD 5362 Lamar University Pearland I.S.D. Technology Plan 2011.
May Agenda  PeopleSoft History at Emory  Program Governance  Why Upgrade Now?  Program Guiding Principles  High-Level Roadmap  What Does This.
The Evergreen, Background, Methodology and IT Service Management Model
Agenda 1. Definition and Purpose of Data Governance
Business plans. What is a Business Plan? - A Business Plan is a written document that defines the goals of your business and describes how you will attain.
Electronic Records Management: What Management Needs to Know May 2009.
DATA GOVERNANCE Presentation to CSG September 27, 2007 Mary Weisse Manager, MIT Data & Reporting Services
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
Global Program Management Dawn Davis, SVP Global Records Management.
Ralph Norris Chief Executive Officer 22 November Which new Bank Update.
Roles and Responsibilities
Department of Grants and District Initiatives 1 San Antonio Independent School District Department of Grants and District Initiatives The purpose of the.
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
Commission on Colleges of the Southern Association of Colleges and Schools (SACS) Reaffirmation of Accreditation.
Relationships July 9, Producers and Consumers SERI - Relationships Session 1.
Stanford Computer Security and You . Higher Education  Higher education environment is open, sharing, exploratory, experimental  Many information assets.
Executive Invitation – Oracle Data Finder Service Oracle Corporation.
Understanding School Finances School Councils. What are school council’s major responsibilities regarding finance? 1.To approve the school’s annual budget.
DukeWeb Enterprise CMS Update for Web Community 2/10/2004 Cheryl Crupi Senior Manager, Duke OIT Office of Web Services.
CIO - CAO Commonwealth of Virginia Strategic Plan for Applications Will Goldschmidt 9 December 2008.
The Problem:  Everyone needs to store financial records  The IRS requires we maintain our financial records for 3-7 number of years  Storing and recalling.
Managing Market Risk. Board of Directors The Boards defines –Market risk –Management policies –Procedures –Prudential risk limits –Review mechanisms –Reporting.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Public Protection Service 2008/9 Charter Mark and Electronic Data Management System (EDMS) Improve performance and efficiency together with improving customer.
Understanding School Finances School Councils. What are school council’s major responsibilities with regard to finance? 1.To develop the school’s annual.
ORGANIZING IT SERVICES AND PERSONNEL (PART 1) Lecture 7.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
THE FOREST SERVICE -ABQ SERVICE CENTER (ASC) Bates, Regensberg, Stewart & Sanchez.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.
Washington Traffic Records Committee Creating & Coordinating a Shared Vision for Traffic Records 2006 Traffic Records Forum August 1, 2006.
ITIL ♥ PM ITIL and Project Management: Friends Throughout the Lifecycle.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
UNIVERSITY OF GEORGIA Overview Presented By Chris Wilkins February 23, 2016 OneSource Project Financial/HR Systems.
Planning & budgeting 25 th November, 2009 Eva Stevens Community Accounting Plus.
February 3, 2009 Bridging Academic and Medical Cultures Academic Research Systems and HIPAA William K. Barnett Anurag Shankar.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Strategies in the Game of
Purpose Review and discuss the IT Policy and Procedure for Incident Handling and Response. Topics Incident Management Policy Incident Response Procedure.
PMI Chapter, IT Governance, Portfolio and Project Management in State Government Chris Cruz, Chief Information Officer, California Department of Food and.
STATE OF NEW MEXICO STATE PERSONNEL OFFICE (SPO)
Agency SFY IT Strategic Plans: Training
CORPORATE & ACADEMIC GOVERNANCE STRUCTURE
Alice Faraone, Villanova University Dan McGee, Villanova University
Data Governance & Management Skills and Experience
Data Governance at UMBC: Built from the Bottom Up
Survey Parents Build Infrastructure for Parent Leadership in CQI
Role of State Audit Bureau of Kuwait in promoting and audit of IT Security  
Security Policies and Implementation Issues
Presentation transcript:

Data Governance Data Architecture Data Development Database Operations Data Security Management Referene & MDM DW & BI Document & Content Mgmt Meta Data Management Data Quality Mgmt.

Data with Extreme risk to the organization or to individuals that we serve. Exposure of this data would lead to identify theft or security risks. Examples: SSN, Driver Licenses, Banking Information, Credit Cards, Health Records, System Backups. Secure (Level 3) Data with sensitivity that should be protected and only used for specific reasons. Examples: FERPA Data, Personnel Information, Payroll Data, Student Data Sensitive (Level 2) Data that is not meant for public consumption, but is available within the University Examples: Applicants, Space Availability, Library Data, Planning Summary's, Financials Internal (Level 1) Data that is or can be presented to the public for news releases or on websites Examples: IPEDS Data, Enrollment Summary, University Budget, Course Catalogs Public (Level 0)

Data with Extreme risk to the organization or to individuals that we serve. Exposure of this data would lead to identify theft or security risks. Examples: SSN, Driver Licenses, Banking Information, Credit Cards, Health Records, System Backups. Secure (Level 3) Data with sensitivity that should be protected and only used for specific reasons. Examples: FERPA Data, Personnel Information, Payroll Data, Student Data Sensitive (Level 2) Data that is not meant for public consumption, but is available within the University Examples: Applicants, Space Availability, Library Data, Planning Summary's, Financials Internal (Level 1) Data that is or can be presented to the public for news releases or on websites Examples: IPEDS Data, Enrollment Summary, University Budget, Course Catalogs Public (Level 0)

Unrecognized Learning to Crawl as an Organization 1 Interested Everyone sees the need, but not fully vested 2 Invested Teams involved and Process have been established 3 Committed Organization has bought in and follows Process 4 Engaged and Embedded It is part of the core operating and strategy 5 Invested Teams involved and Process have been established 3

Executive Leadership

Chief Data Officer

Executive Leadership Chief Data Officer Data Governance Committee Data Architecture Committee

Executive Leadership Chief Data Officer Data Governance Committee Data Architecture Committee Data Stewards (Can be multiple groups)

Executive Leadership Chief Data Officer Data Governance Committee Data Architecture Committee Data Stewards (Can be multiple groups) Data Custodians & Curators. Campus Users

DoIT Develops Core Data Set Provides Infrastructure Provides Tools Provides Training Provides support to service providers Shared Service Group Support End Users Recommends Updates/Changes Trains Users Ensures Rules are Being followed.