WSNPresentation 18 December, 2003. Slide 1 Overview of WSN Project.

Slides:



Advertisements
Similar presentations
GSEG Project Project Update. Topics n Data Requirements and Recommendations n Assessment of Local Data Quality.
Advertisements

Enabling Secure Internet Access with ISA Server
OPI’s K20 Data Project Montana Electronic Transcript Initiative Available Spring 2015 Free Certified Transcripts!
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Data Collection An overview of how data are collected and used in Washington state.
Wisconsin Department of Public Instruction
July 11 - September FFIEC Central Data Repository Bank Enrollment.
An Introduction to the Individual Student Enrollment System ISES Segment 2 Department of Public Instruction Spring 2008.
Supportive Services for Veteran Families (SSVF) Data Bigger Picture Updated 5/22/14.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Supportive Services for Veteran Families (SSVF) Data
Employment and Training Administration DEPARTMENT OF LABOR ETA Reporting and Data Validation Updates Presenters: Wes Day Barbara Strother Greg Wilson ETA’s.
California Assessment of Student Performance and Progress (CAASPP) Online Reporting System Guidelines for the 2014 California Smarter Balanced Field Test.
MyFloridaMarketPlace Roundtable August 20, 2003 MyFloridaMarketPlace.
Chapter 10: Authentication Guide to Computer Network Security.
Electronically approve and create Suppliers in Oracle Financials using a combination of APEX and Oracle Workflow. NZOUG Conference 2010 Brad Sayer Team.
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
Role of Account Management at ERCOT Market Participant Identity Management Overview (MPIM)
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
ABSTRACT Zirous Inc. is a growing company and they need a new way to track who their employees working on various different projects. To solve the issue.
University of Kentucky Proxy Service Presentation By Kelly Vickery
StudentTracker for a service provided by CONFIDENTIAL- ©2011 National Student Clearinghouse. All rights reserved.
February 27,  PI-1202 / PI-1203 / PI-1280  Data Element Changes  October 1 Child Count  Schedule  Areas needing improvement  Future enhancements.
Supportive Services for Veteran Families (SSVF) Data HMIS Lead and Vendor Training Updated 5/22/14.
Trade Software Developer Technical Seminar Document Imaging System March 7, 2012.
ISES UPDATES August 28, Topics for Session Review of the Fall 2007 CD/YE Collection Changes in WSLS ISES Data CD/YE Element Changes October 1 Supplement.
Wisconsin Department of Public Instruction INDIVIDUAL STUDENT ENROLLMENT SYSTEM ISES Phase 2 Training August 2005 (revised August 10, 2005)
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
ACCESS for ELLs ® 101 Title III Conference October 7, 2010.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ISES CD/YE Enhancements Fall 2007 – Segment 1. Topics for Today Preparing for the ISES Collection Common Errors from Fall 2006 ISES Collection Changes.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
On-line data submission training California Partnership for Achieving Student Success.
State and Local IT Challenges No Child Left Behind Act of 2001 State and Local IT Challenges Wisconsin Digital Government Summit November 2003.
Greta Robertson Kathy Hoffman /11/2011 SCEIS Finance Automated Interfaces.
Computer Emergency Notification System (CENS)
ISES UPDATES April 16, Topics for Session Review of the Fall 2007 CD/YE Collection Changes in WSLS ISES Data CD/YE Element Changes October 1 Supplement.
The Initiative For School Empowerment and Excellence (i.4.see) “Empowering teachers, administrators, policy makers, and parents to increase student achievement.”
1 The New York State Education Department New York State’s Student Data Collection and Reporting System.
ISES Vendor Conference March 28, Current Status of ISES Initial submission period is complete Review and Revision period ended March 13 – Some districts.
Essential 3a - SSID Enrollment Capabilities and Key Concepts v3.0, August 07, 2012 SSID ENROLLMENT Capabilities and Key Concepts Essential 3a.
Updated: 08/10/07 Web Grades Overview MAIS The Office of the Registrar and Michigan Administrative Information Services.
0 eCPIC Admin Training: OMB Submission Packages and Annual Submissions These training materials are owned by the Federal Government. They can be used or.
1 Standard Student Identification Method Jeanne Saunders Session 16.
Slide 1 Wisconsin Student Number System WSLS June Department of Public Instruction.
An Introduction to the Wisconsin Student Number Locator System W S L S Segment 2 Department of Public Instruction Spring 2008.
OLDC Version 3.0 October 18, How to Connect (Telephone Conference) The Deployment Teleconference consists of a telephone conference and a Bridgit.
Standard Unique Health Identifier for Health Care Providers April 9, th Annual HIPAA Summit Gail Kocher Highmark.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
ISES Discipline Collection Fall 2007 – Segment 1.
Special Education Federal Child Count Reporting NOVEMBER 2015.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
W S L S Wisconsin Student Number Locator System Department of Public Instruction April 2006.
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
WSLS/ISES Overview Data Ambassadors Session September 28, 2006.
Montana Office of Public Instruction Linda McCulloch Superintendent OPI Student Information System Madalyn QuinlanDonna O’Neill Charlie.
2016 TELPAS Online Testing. TELPAS Assessment Management System Accessed at
Wisconsin Department of Public Instruction Getting Started with the INDIVIDUAL STUDENT ENROLLMENT SYSTEM Segment 1 (revised July 1, 2006)
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Creating and submitting Cal-PASS Data files California Partnership for Achieving Student Success.
ACE Presentation for Industry
Required Data Files Review
Basic Web-based Emissions Inventory Reporting (Web-EI)
SSID ENROLLMENT Capabilities and Key Concepts
Special Education Child Count
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

WSNPresentation 18 December, 2003

Slide 1 Overview of WSN Project

Slide 2 Why WSN?

Slide 3 Why WSN? No Child Left Behind (NCLB) requires extensive new data collection and reporting. Meeting NCLB report card mandate requires a student level data collection. Student numbers protect privacy and facilitate student level data collection and reporting.

Slide 4 NCLB requires extensive new data collection and reporting Outcomes of interest include test results, attendance, graduation, and dropout rates. Outcome data must be disaggregated by gender, race/ethnicity, disability, economic status, migrant status, and English language proficiency Disaggregation=2X5X2X2X2X2= 160 distinct combinations/groups for aggregate reporting. 40 groups if you don’t count gender and migrant status. More groups are required to report by grade, primary disability and English language proficiency level.

Slide 5 NCLB requires extensive new data collection and reporting. States must report on the acquisition of English proficiency by English language learners. Reporting of test results is for students enrolled for a full academic year. States and districts must distinguish between dropouts and transfers.

Slide 6 NCLB requires extensive new data collection and reporting. Requirements apply to DPI, districts, and schools. Wisconsin data fall short of meeting NCLB requirements. DPI and Wisconsin school districts need to modify existing data systems to fill the gaps. Meetings were held with selected legislators and staff. Wisconsin hired national experts to help gather input from internal and external groups and to analyze options

Slide 7 Meeting NCLB requires a student level data collection No Child Left Behind (NCLB) Act requires that we monitor the movements and progress of students and student groups over time. The only efficient way to collect these data is at the student level. Wisconsin schools receive over $250,000,000+ annually under NCLB but data requirements must be met. All states in the Midwest and almost all states nationwide have already moved or are moving in this direction. Wisconsin will design and implement a individual student enrollment system (ISES). The WSN Locator System is the first phase of ISES.

Slide 8 Student numbers protect privacy and facilitate reporting WSNs help protect privacy because – They can be used in lieu of names in the student level report card data collection (i.e., the individual student enrollment system, also known as ISES). – WSNs will contain no embedded meaning. – Social Security Numbers will not be used or collected. – WSNs will be stored in encrypted form in the report card data base at DPI. Names will not be included in this data base. – Only authorized persons will have access to this data base.

Slide 9 Student numbers protect privacy and facilitate reporting WSNs facilitate reporting because – They can be used to efficiently combine data about a student stored in different collections and over time. Combining data is critical for meeting NCLB requirements. – It is possible to store student data once and use/submit the data for multiple reporting purposes.

Slide 10 Why WSN? No Child Left Behind (NCLB) requires extensive new data collection and reporting. Wisconsin gets hundreds of millions of dollars for schools through NCLB. Meeting NCLB report card mandate indirectly requires a student level data collection. Other states have moved or are moving in this direction. This is a major shift for DPI and for many districts. We are working to design a system that will provide value to schools for school improvement purposes. We will provide multiple options for WSN Locator System use to recognize the variety of local student information systems in place. Training and support will be available through our WSN contractor (TDS) and DPI. Extensive information will be provided on the ESEA report card web page. We are working to minimize the burden, but some time and money will be required for implementation. Vendors are encouraged to begin work now to minimize effort for districts served. Student numbers protect privacy and facilitate student level data collection and reporting. WSNs may be used locally if treated as confidential. Security and privacy are our number 1 concerns. More will be said about this later in the presentation. Local IDs may continue to be used.

Slide 11 WSN Requirements Student ID Process – Student Identifier – Student ID Initial Assignment – Yearly Assignment for Kindergarten Student – Request New WSN Student ID Individually (Via. Web) – Student Locator – Exit Process

Slide 12 WSN Work-Flow Overview How Schools will use WSN Locator System – Initial Load – Assign WSN – Locate Students – Resolve Duplicates

Slide 13 WSN Work-Flow Overview (continued) How to Resolve Duplicates – New School Requests Exit Confirmation – Current School Verifies Status of Student – Current School Approves or Declines Exit – Request WSN If Match Not Found

Slide 14 WSN Work-Flow Overview (continued) Schools Assign/Locate WSNs 4 Ways – Using a CSV File – Using a XML File – Using a Mass Entry Screen in the WSN Locator System – Using an Individual Request Screen in the WSN Locator System

Slide 15 Option 1

Slide 16 Option 2

Slide 17 Option 3

Slide 18 Option 4

Slide 19 Archiving Student Data at the End of the School Year

Slide 20 Archiving Student Data at the End of the School Year Requirements Any student who was enrolled in the district at any time between the third Friday in September 2003 and July 2004 should be included in the initial WSN file unless the student transferred to another public school district, private school, or state- or district-approved educational program. This means that the initial file should include the following students: – students enrolled at the end of the school term, – students who completed high school anytime during the school year, and – students who stopped attending school at any time during the school year but did not transfer.

Slide 21 Archiving Student Data at the End of the School Year Requirements Any student whose primary educational services are directly supervised by your district should be included in the initial file. Services may be provided by district employes or by third party public or private contractors. Examples include technical colleges, community-based organizations, nonprofit-nonsectarian agencies, school to work program providers, etc. if the student is enrolled in your district.

Slide 22 Archiving Student Data at the End of the School Year Requirements – WSNs and ISES-required data for all students in the initial WSN file who are no longer enrolled after the school year must be archived locally. – These data must be included with ISES high school completion and ISES dropout data in the fall of – A list of ISES-required data will be available this spring at the ESEA report card Web page.

Slide 23 Archiving Student Data at the End of the School Year Thinking ahead to – Archive WSNs and ISES-required data for all students who were enrolled AT ANY TIME during the school year at least through fall 2005 ISES reporting EVEN IF students transfer out. – These data will be needed for ISES attendance reporting and more in fall – A list of ISES-required data for fall 2005 will be available at the ESEA report card Web page.

Slide 24 Interface Specification for Schools Information Systems

Slide 25 eXtensible Markup Language (XML)  What is XML?  Why do we use it?

Slide 26  Transaction Set Envelope  Student Load Transaction  WSN File Transaction  WSN Transaction Result Report  WSN Student Load Duplicate Report Interface Specification Sections …

Slide 27 Escaping Characters These are characters that cannot appear in their literal form but can be sent in as Entity References: Example: Andre’ would be represented as Andre&apos; Entity NameNameSymbol <Less than< >Greater than> &Ampersand& &apos;Apostrophe‘

Slide 28 Document Type Definition (DTD )  DTD is to used define the legal building blocks of an XML document  Defines the document structure with a list of legal elements  The WSN Locator System will utilize an external DTD  Optional Elements are identified with “?”  Multiple Elements are identified with “+”

Slide 29 Testing XML with DTD XMLcheck.html

Slide 30 No errors found in the XML file Errors found in the XML file

Slide 31 Comma Separated Value (CSV ) The WSN Locator System accepts three distinct header types: 01 – Header record 02 – Student Detail records 03 – Trailer record. These header types tell the WSN Locator system what type of data and in what format to expect to find the data in the row

Slide 32 Comma Separated Value (CSV) cont …  Same business rules and edits apply to the CSV transactions  Quoted string values Example: “02”, “DOE”, “JOHN”, “”, “01/01/1990”

Slide 33 XML vs. CSV Advantages to using XML  XML format can be easily read by a user  Current with emerging technologies  Increased flexibility in data collection  Unlimited occurrences of data like ALIAS and GUARDIAN  Ease of adding / modifying fields

Slide 34 Certification Process  Generating a VALID School Student Load transaction (passing the DTD validity check consistently)  Submitting a VALID School Student Load transaction to the WSN Locator System via FTP to a designated server at DPI  Successfully passing the WSN Locator edit checks and business rules  Loading the assigned WSN Id back into the School’s Student Information System and matching the WSN Id back to the correct student  Only do this if you have a TEST database.

Slide 35 Advantages of being Certified  Positive publicity in the state that your software can meet the DPI guidelines to participate with the WSN Locator System  Instant notification to your clients that you are certified via the DPI WSN Locator website where the Certification matrix is displayed  Future business opportunities with schools that would be looking for a package

Slide 36 WSN Standards Three code tables will be used during the validation edits in the XML/CSV code and the application code  Gender Code table  Race Code table  State Code table

Slide 37 WSN Standards continued… File Naming Conventions Six data elements and a file extension  Send or Receive Tag – 1 character  District Code – 4 characters  School Code – 4 characters  Transaction Date – 2 month, 2 day, 4 year values  Transaction Type – 3 characters  Sequence Number – 5 digit number  File extension (XML, CSV, or HTML) SendReceiveTag_DistrictNumber_SchoolNumber_MMDDYYYY_Type_SeqNumber.csv S_0001_0002_ _SST_00001.csv

Slide 38 Where to BEGIN….. 1.Update your Student Information Systems to contain the DPI Code tables 2.Apply the WSN Locator System business rules to your software 3.Generate the XML/CSV School Student Load transaction 4.Run the stand-alone Document Type Definition test using the xmlcheck.html 5.FTP the Pilot Student Load transaction to the FTP folder 6.If WSN IDs were assigned, update SIS with WSN IDs  Only if you have a Test database 7.If WSN IDs were not assigned, check the results reports, correct the data, and resubmit 8.Inform your clients when you have been certified and distribute software changes/patches

Slide 39 Security for the Exchange of Electronic Data Privacy ( Follow State & Federal Law ) Managing access to data Managing user “identities” or accounts

Slide 40 Security Solutions in DPI’s WSN Locator System Privacy To keep the conversation private and confidential between the State’s server and the WSN Locator client at a school or district office, the standard mechanism of strongly encrypted SSL shall be employed. All modern, popular web browsers are capable of conducting conversations over strongly encrypted SSL.

Slide 41 Security Solutions in DPI’s WSN Locator System (Continued) Managing access to data To ensure that only authorized users may access the WSN Locator System and its data, the State’s Web Access Management System (WAMS) will be employed. When granting or denying access to a web browser’s request, WAMS bases its decisions on 1. proof that the user holds an authentic account and 2. membership of the user in an appropriate “role”.

Slide 42 Security Solutions in DPI’s WSN Locator System (Continued) Managing user accounts To facilitate the creation and maintenance of user accounts and the assignment of users to roles, WAMS consists of production-proven tools and procedures that shall be employed. A carefully engineered and supported WAMS infrastructure was implemented in 2001, which includes web applications for users to manage accounts. For role assignments, strict procedures are followed from the school level and on to the State level.

Slide 43 Further Information about Managing Access When the WSN Locator System responds to a web browser’s request, it does so within the context of the user’s account information. In having the WSN Locator System utilize WAMS, the user’s account information is added to security audit trails. These security audit trails help prove that the WSN Locator System is used in a secured manner by only those persons with the authority to do so.

Slide 44 Managing Access When someone submits a web request of the WSN Locator System, WAMS will always perform two steps: 1. Authentication 2. Authorization

Slide 45 Managing Access (Continued) Authentication When a user has not yet proven the possession of authentic user account information, WAMS will interrupt the request by prompting the user for a userID and password. Upon successfully authenticating the supplied information, the user is not interrupted again for subsequent requests. This is accomplished through use of an in-memory (a.k.a. transient or “session-based”) cookie in the user’s browser: one of the few browser requirements for using the WSN Locator System.

Slide 46 Managing Access (Continued) Authorization For every user request of the WSN Locator System, WAMS will seek out the necessary membership for that user in a role that has been entitled to that request. To illustrate, here is an example only.

Slide 47 An enrollment officer is entitled to upload a file of person data while an administrator is not so entitled. Assume the user Jim is a member of the administrator role and Renee is a member of the enrollment officer role. Upon requests to upload a data file, Jim is denied access, and Renee is granted access. Managing Access - Example IS MEMBER OF Renee Jim ADMINISTRATORS ENROLLMENT OFFICERS FILE UPLOAD

Slide 48 Managing User Accounts Creation and Maintenance of User Accounts The following series of screen shots illustrate some of the web applications in the WAMS toolset that allow individuals to manage their own account information.

Slide 49

Slide 50

Slide 51

Slide 52

Slide 53

Slide 54 Managing User Accounts Role Assignment After a person has created an account in WAMS by using the Self-Registration web site, a responsible and authorized officer or agent of the school or district must request that the new user account be made a member of the appropriate WSN Locator System role. The identity of the school or district must also accompany the request so that the user may work on behalf of that organization. Only the data for that organization will then be available within the WSN Locator System to the user.

Slide 55 WAMS User Acceptance Agreement Your User ID and password are your keys to the State of Wisconsin over the Internet; they should be considered as important as your signature. Do not share your User ID and password with anyone. It is your obligation to protect it by keeping it confidential. Your user account must have a unique address. Your user account must have a unique address. Etc.Etc.

Slide 56 Browser Requirements (X.509) Must accept a valid State of Wisconsin certificate (X.509) Must accept session cookies Must accept session cookies If a proxy server is used, it must pass cookies to your browser If a proxy server is used, it must pass cookies to your browser Some applications may require enabling JavaScript and Pop-up Windows Some applications may require enabling JavaScript and Pop-up Windows

Slide 57 Implementation Timeline? Report Card Data must be publicly disseminated by We’re late. Good-faith effort must be made to meet all the requirements at the earliest possible date

Slide 58 WSN Timeline

Slide 59 To Make WSN a Reality Next Steps School/District Vendors Commit to the Project Check , web DPI/TDS Vendor support Start an Approved process for SIS Vendor(s) assignment of WSN Vendor Training for School/District personnel Vendor deploy new software with WSN enhancement Address any issues of Hardware Connectivity to State LAN Review Policy and Procedure changes for WSN process

Slide 60 To Make WSN a Reality Final Steps Develop Deploy Train Support

Slide 61 Risk Management WSN Risk Areas – User Buy-In and Ownership – School Information System Packages (Vendors) – Network Infrastructure – Security – Integration of Other Systems Others?

Slide 62 For More Information DPI’s NCLB Report Card Web site

Slide 63 Open for Discussion