1 Welcome CMS V Workshop Employee Central.. 2 Project Sequence – Training, Workshops, Hands-on Sessions Overall Governance -- Completed/Ongoing Portal.

Slides:



Advertisements
Similar presentations
© 2007 BigVisible Solutions, Inc. All Rights Reserved Coaching Solutions Agile Project Start v
Advertisements

THE BUSINESS PLAN The Business Plan Chp. 5 ITB.
IT Security Policy Framework
State of Indiana Business One Stop (BOS) Program Roadmap Updated June 6, 2013 RFI ATTACHMENT D.
Information Asset Classification Communications Forum Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services.
GW Introduction to Google Drive Security and Smart Sharing Practices.
Auditing Concepts.
Page 1 County of Los Angeles Corrective Action Plan Program Enhancements John Sterritt CEO Risk Management.
Chapter 5: Asset Classification
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
1 Vendor Evaluation: Selecting for Success Dana McCormick Wells Fargo Home Mortgage Delivery Services Baltimore PCC Education Seminar April 27, 2007.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Risk Management.
Powered by: SmartPros ADP LUNCH & LEARN CPE PROGRAM “How Do You Price Your Services?” Based on a program by: John Burnett, Prof. of Marketing, Univ. of.
Information Asset Classification
Unit Introduction and Overview
> API Program Overview. © 2013 Apigee Confidential – All Rights Reserved Welcome to Apigee! In order to prepare for a successful partnership in your API.
Introduction to Business
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
RISK ASSESSMENT 2010/2011 M.J Ramakgolo. THE PURPOSE The aim of the risk assessment session is to develop the Strategic Risk Profile for the municipality.
1 Summary of Migration Process HalWorld to Employee Central October 2003.
The Organizational Plan (Details of Your Business) 2-2.
ADOPTING OPEN SOURCE INTEGRATED LIBRARY SYSTEMS Best Practices Presented by Vandana Singh, PhD Assistant Professor, School of Information Sciences University.
PROJECT TITLE Project Leader: Team: Executive Project Sponsor (As Required): Date: Month/Day/Year 6/25/2015 V2.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Financial Fitness Financial Capability Program VISTA Presentation Working Together for Strong Communities.
Roadmap to successful ECM implementation Kateřina Divišová British Chamber of Commerce
Delivering business value through Context Driven Content Management Karsten Fogh Ho-Lanng, CTO.
1 Welcome Taxonomy III Workshop Employee Central..
1 Welcome CMS III Workshop Employee Central.. 2 Project Sequence – Training, Workshops, Hands-on Sessions Overall Governance -- Completed/Ongoing Portal.
Click here to advance to the next slide.. Chapter 5 Entrepreneurship Section 5.2 The Business Plan.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
CIA Annual Meeting LOOKING BACK…focused on the future.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Project Kick-off Meeting Presented By: > > > > Office of the Chief Information Officer.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
1 Welcome Taxonomy II Workshop Employee Central..
Chapter 5. Why is Planning Important Need to plan because: Investors, guide for owners and managers, direction and motivation for employees, provide an.
Risk Management for Small & Medium Sized Enterprises
1 Welcome CMS IV Workshop Employee Central.. 2 Project Sequence – Training, Workshops, Hands-on Sessions Overall Governance -- Completed/Ongoing Portal.
5-1 Chapter 5: The Challenges of Starting a Business Exploring Business 2.0 © 2012 Flat World Knowledge.
Outsourcing of Census Operations United Nations Statistics Division UNSD-ESCWA Regional Workshop on Census Data Processing in the ESCWA region: Contemporary.
Purchasing Forum – May The integration of the activities, plans, attitudes, policies, and efforts of the people of an organization working together.
Outsourcing of Census Operations United Nations Statistics Division Regional Workshop on the 2010 World Programme on Population and Housing Censuses: International.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy's NNSA UNCLASSIFIED Classified Information Security Event EFCOG Fall Workshop.
2011 Consultation Webinars Name of presentation Name of presenter 15 September 2010 Draft 2011 Investor CDP Consultation Risks & Opportunities Michelle.
Data Analytics & Advisory Services Ann C. Dzuranin, PhD Associate Professor, Accountancy Northern Illinois University 2016 Deloitte Foundation/FSA Faculty.
Enterprise Oracle Solutions Oracle Report Manager The New ADI and More Revised:June 20091Report Manager/SROAUG Presentation.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Service Organization Control Reports What Have We Learned? Chris Bruhn DIRECTOR, IT RISK SERVICES, BKD, LLP SAS 70 ENDS EXIT TO SSAE 16.
March, 2004 Into the LAN: An Integrated LAN/WAN End User Study © 2004 Frost & Sullivan. All rights reserved. This document contains highly confidential.
RENO DeCA 2000 ALA Vendor Stocking Committees. What is Vendor Stocking Retail (Outside Gate) Commissary Answer: Product Which Vendor’s Pay to Stock in.
Classification September 2003© Peltier and Associates, all rights reserved Creating an Asset Classification Methodology ISIG & ISSA September, 2003.
Class 12: Exam Review  Client project  Exam review -- check list for client project  Client project work time and Q & A.
CS457 Introduction to Information Security Systems
Auditing Concepts.
Office 365 Security Assessment Workshop
Information Asset Classification Communications Forum
Learn Your Information Security Management System
Description of Revision
Derivative Classification Overview
Microsoft Cloud Adoption Workshop
Information Sensitivity
RISK RATING GUIDE APPENDIX C LIKELIHOOD RATING Rating Description
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

1 Welcome CMS V Workshop Employee Central.

2 Project Sequence – Training, Workshops, Hands-on Sessions Overall Governance -- Completed/Ongoing Portal II Communication Planning (CP)Communication Planning (CP) CP Workshop Create CP Strategy CP Action Planning CP Execution Taxon- omy I CMS IPortal I Governance Overview I Training & Workshop Activities Format Set-up Content Migration Pre-Launch Slides Interwise Live Mtg. CBT CBT CBT CMS IV CMS V Taxo III Hands-on Working Sessions Taxo II CMS III CMS II EC Over- view WS WS WS WS WS WS WS Delivery WS Solution Concept Content Inventory Preparation Project Timeline Kickoff Interwise and I-Learn Slide Decks Slide Decks

3 Agenda – CMS V: Folders, Metadata, & Security Criteria for New Folders Create New Folder Structure Security – Groups/ACLs

4 Criteria for New Folders Evaluate the following: –Obsolete organization of content –Too little content in some folders –Too much content in some folders –Content too tangled – need tidying, etc. With HalWorld, the folder structure organizing content tends to be archaic (inherited) due to a lack of folder “governance” – so moving to CMS provides an opportunity to clean up this folder structure Archaic/Chaotic vs. Logical Organization

5 Create New Folder Structure Creating the folder structure early is a must – and this requires a view into the future since changing the folder structure later can be a challenge A folder structure should be based on how you organize your content rather than on how you want to present content or how your department or workgroup is organized Sample Folder Structure as it appears in CMS – Web Desk Pro Sample Folder Structure created in Excel

6 Create New Folder Structure Key Steps/Questions: –Review HalWorld charter (folder structure) –How is content organized? (based on?) –How much content is there (per folder)? –What would you change? –Create a draft folder structure –Will the proposed structure last? (at least 12 months or longer)

7 Content-Level Security Content Security (restrictions) – Identifying access to content – restricted, confidential, internal use, public access. Security Definitions Access Control All information must be identified and classified according to its level of confidentiality and business need-to-know. Classifications are: PUBLIC, INTERNAL USE, CONFIDENTIAL, and RESTRICTED. Anyone requiring access to confidential or restricted information that is owned by another group must obtain permission from the Business Owner. Classification of the data is the responsibility of the Business Owner but can be delegated. Although not recommended to have multiple owners for the same data, this sometime occurs. Where there is more than one owner of the confidential data, Business Owners must designate a Business Owner who will make access decisions on behalf of all the owners of this data... Restricted High - Critical Value Information intended for restricted use only by those employees with an explicit, predetermined stringent business need-to-know. Information whose unauthorized disclosure or destruction would result in severe damage, provide significant advantage to a competitor, or cause penalties to HAL, its customers, or employees, and/or cause significant impact to HAL systems and business operation... Confidential High Risk (Medium - Critical Value) Information intended for sole use within HAL and limited to a need-to-know. Information whose unauthorized disclosure or destruction would directly or indirectly result in adverse impact on HAL, its customers, or employees. Financial loss, damage to HAL’s reputation, loss of business, and potential legal action could occur... Internal Use Moderate Risk (Low - High Value) Information is limited to HAL employees, contractors, and vendors covered by a non-disclosure agreement. If there is an unauthorized disclosure, compromise, or destruction of this information, there would be minimal or no significant impact to HAL, its customers, or employees. This is the default classification... Public Low Risk (None or Unclassified) Information that can be disclosed to anyone. It would not violate individual’s right to privacy. Knowledge of this information does not expose HAL to financial loss, embarrassment, compromise a competitive advantage or jeopardize the security of HAL.

8 Security – Groups/ACLs (access control lists) CMS has the ability to define content-level security/access – as in this sample table, which is also shows the methodology to follow to determine content-level security Content Name Description Purpose of the restriction CMS Users User(s) who will manage the content in CMS Portal Users Users who will have access to the content on the portal All Accounting UsersThis group will have access to the workgroup and unrestricted content Names RedBook UsersThis group will have access to the RedBook files; no other users should be able to view these files Names Exposure ReportCut editions to provide versioning Names

9 Thank You community pages only CMS V Employee Central. More Training: Portal Training and Policies Site