Anyone can build a mobile App so how they heck do you govern that? BRETT POLLAK UC SAN DIEGO.

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

Office of the General Counsel (OGC) Strategy Map FY 11 August 2011 University Strategic Goals 1. Ensuring student success OGC Strategic Directions OGC.
Background This linked collaborative is intended to identify opportunities to exchange best practices, administrative and regulatory support models and.
OVERVIEW Two major initiatives Published Catalog Automated Graduation Certification.
WHY CMS? WHY NOW? CONTENT MANAGEMENT SYSTEM. CMS OVERVIEW Why CMS? What is it? What are the benefits and how can it help me? Centralia College web content.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Dawn Ellis, University Website Programme A whistlestop tour of website management and governance.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Standards and Guidelines for External Quality Assurance 19 May 2009 Axel Aerden International Policy Advisor.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Copyright Dong Chen, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Imperial College Web Review Imperial College.... An audience-focused realignment of our web strategy with our College strategy, our market, technology.
UNLV Data Governance Executive Sponsors Meeting Office of Institutional Analysis and Planning August 29, 2006.
Medicaid Information Technology Architecture (MITA) Where Louisiana Medicaid is Today and Where it Will To Be in the Future April 17, 2012.
Basic Research Administration Principles Presented by Ronald Kiguba Research Coordinator, Makerere Medical School.
Standards and Guidelines for Web Page Publishing December 9, 2009.
ACUPA The Association of College and University Policy Administrators Communicating Policy Michele Gross University Policy Program Director.
Peer Information Security Policies: A Sampling Summer 2015.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Agenda 1. Definition and Purpose of Data Governance
ACADEMIC PERFORMANCE AUDIT
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Content Strategy.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
The Report of the Provost’s Advisory Group on the SUNY Assessment Initiative September 2009 Tina Good, Ph.D. President Faculty Council of Community Colleges.
Best Practices: Financial Resource Management February 2011.
Secretary’s Advisory Committee on Human Subjects Protections (SACHRP) Summary of Responses on: Advanced Notice of Proposed Rulemaking (ANPRM) on Holding.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
1 HIPAA: Privacy Regulations Addressing HIPAA at Harvard University Tina S. Sheldon Harvard University HIPAA Colloquium at Harvard University Cambridge,
Top Issues Facing Information Technology at UAB Sheila M. Sanders UAB Vice President Information Technology February 8, 2007.
Capture the Movement: Banner 7.0 and Beyond Susan LaCour, Senior Vice President, Solutions Development California Community Colleges Banner Group.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Assessment of Portal Options Presented to: Technology Committee UMS Board of Trustees May 18, 2010.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
WP1: IP charter Geneva – 23rd June 2009 Contribution from CERN.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Database Administration
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
© 2007 Open Grid Forum Enterprise Best (Community) Practices Workshop OGF 22 - Cambridge Nick Werstiuk February 25, 2007.
CUNY Human Research Protection Program (HRPP) School of Professional Studies April 18, 2013
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
Security Training and Awareness Brad Reed, IT Security Analyst OIT – Information Security Office Securing the University – ITSS 2015.
Tax Administration Diagnostic Assessment Tool MODULE 11 “POA 9: ACCOUNTABILITY AND TRANSPARENCY”
1 HIPAA: Privacy Regulations Addressing HIPAA at Harvard University Tina S. Sheldon Harvard University HIPAA Summit West II San Francisco, California March.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Project Management Strategies Hidden in the CMMI Rick Hefner, Northrop Grumman CMMI Technology Conference & User Group November.
THE INSTITUTIONAL REVIEW BOARD. WHAT IS AN IRB? An IRB is committee set up by an institution to review, approve, and regulate research conducted under.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Payment card industry data security standards
University Wide Vulnerability Scanning Program
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
How to Apply for and Receive Industry Funding for Investigator Sponsored Research Chuck Simonton MD, FACC, FSCAI Chief Medical Officer Abbott Vascular.
Clinical Engineering Lecture (3).
Vendor Management and Software Asset Management
UNLV Data Governance Executive Sponsors Meeting
HIPAA Summit West II San Francisco, California March 13-15, 2002
IS4550 Security Policies and Implementation
CUNY Human Research Protection Program (HRPP)
UC Riverside Chairs 201 Workshop
Presentation transcript:

Anyone can build a mobile App so how they heck do you govern that? BRETT POLLAK UC SAN DIEGO

EDUCAUSE ECAR Mobile App Working Group Brett Pollak, UC San Diego (Co-Chair) Rose Rochio, UCLA (Co-Chair) Jim Burgoon, Ohio State University Deepika Chalemela, UT Arlington Jason Fish, Purdue Jeffrey Rosczyk, UC Santa Cruz Lori Tirpak, Oakland University Chris Ward, Kennesaw State Robin Ying, Tidewater Community College

App development made easier App code generators make development quicker Maturation of the market

Who’s building Apps? Internal IT staff Faculty / Researchers Students Vendors (with internal sponsor)

Key considerations How do you determine what qualifies as an institutional app? What brand requirements are there? Are there processes in place to assure an app is tested for quality assurance? What are the data security and legal requirements protecting privacy (FERPA)? How is intellectual property determined when apps are developed by students or faculty? Are there financial considerations?

Governance Goals People, Policies, and Processes Produce mobile apps aligning with institutional strategic priorities Leverage existing structures if possible

Responsibilities Facilitating executive buy-in to mobile app governance policies and processes Streamlined process for review and approval of institutional mobile apps to be made available in public app stores Ensuring appropriate stakeholders are represented in decision making

Governance is Cyclical Convene Group Set Goals Publish Guidelines Review, Test and Deploy Maintain and retest

Unit/StakeholderRole/Responsibility Information Technology (IT) Technical review, security audits, code assessment/compiling, keys/certificates, maintain app store presences Marketing/Communications Naming, branding, design, editorial/language consistency Institutional Research Review Board (IRB) Adherence to responsible research practices Hospital, Medical Center/College of Medicine HIPAA, human subject concerns Legal App store contracts, vendor RFPs Technology commercialization/ Intellectual Property Assess commercial viability/pricing, potential for technology licensing, IP usage Academic/Faculty Strategic direction, concept validation, development resources Students Sounding board; user testing and feedback; creator of student-developed apps;

App Categories External focus with intent to communicate info about the university Internal focus to support administrative transactions Research based Apps with a narrow focus

What qualifies as a university App? Is the app owner/publisher a university faculty, student or staff member? Is the owner/publisher acting on behalf of an institutional department or unit? Does the app’s purpose and function align with an institutional priority, strategic goal or academic pursuit? Do the app’s intended audiences align with the institution’s constituency (Students, Faculty, Alumni, Patients, etc.)?

Branding Minimum set of standards Produce branding and graphic templates

Paid Apps Athletics: App was free to download but contained “premium content” Single merchant account Technology transfer office review

Advertising What is the institutional policy for advertising on electronic mediums? What is the view of adds within and App?

Data Governance Considerations Can they make use of secure data, e.g., (FERPA/HIPAA) from an ERP (i.e. grades/class schedules) or other data stores IRB/export control and ITAR (?) issues – certain nationalities not allowed to work with or access the data Does your app governance process account for online content-- content provided to the app via an API, database, or other mechanism?

Testing What level of responsibility does the governance group have for testing? ◦Testing with Devices ◦Testing with Emulators ◦Testing with Devices and Emulators Are apps proactively checked for vulnerabilities? If a critical security issue is discovered, does the governance process have a resolution plan?

Distribution What App Stores do you support? Process for Managing publishing to App Stores iOS ◦Single University Account enforced by DUNS number ◦No good method of distributed access to administration

App Store Administration Models Allow requestors to have direct access to the administration panel Have central IT be the broker Have vendors publish through their own accounts

Maintenance Review Analytics to monitor usage Review feedback Give the governing body authority to decommission Apps

Thank You Brett Pollak UC San Diego