August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. Table of Contents Definitions Bona fide identity. Digital identity.

Size: px
Start display at page:

Download "August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. Table of Contents Definitions Bona fide identity. Digital identity."

Transcription

1 August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. A comprehensive set of tools and processes for creating and managing digital identities for all entities that are affiliated in some capacity with U-M and that need access to IT resources. Table of Contents Definitions... 1 What Is Identity Management?... 2 How Will It Be Used?... 2 Business Process Model... 3 Dependencies... 3 Business Requirements... 3 Appendix 2-A: Populations and Data Sources... 4 Appendix 2-B: Search-Match and Minimum Data Requirements... 4 Appendix 2-C: Identity Lifecycle Use-Case Analysis... 4 Definitions Bona fide identity. An identity supplied to MCommunity that was generated in an institutional source system, such as the Human Resources or Information system, using established institutional identity creation practices and therefore possessing an inherent high level of assurance and validity. Digital identity. The electronic representation of a real-world entity. The term is usually taken to mean the online equivalent of an individual human being, which participates in electronic transactions on behalf of the person in question. However, a broader definition

2 also assigns digital identities to organizations, companies, and even individual electronic devices. 1 Strong identity. An identity in MCommunity that contains adequate identity data to confidently match against identities in other systems. Weak identity. An identity in MCommunity that lacks adequate identity data to confidently match against identities in other systems. What Is Identity Management? Identity Management is a comprehensive set of tools and processes for creating and managing digital identities for all entities that are affiliated in some capacity with U-M and that need access to IT resources. Identity Management also includes capabilities to manage non-person entries in the Directory. 2 Identity Management is not a monolithic application, but rather a series of tasks performed by multiple software components and technologies. MCommunity Identity Management is not a provisioning system; its tools manage identity data but do not assign resources. Provisioning tools and logic outside of Identity Management will be used to assign resources. Resource owners will be able to define and implement criteria, based on identity data, that will be used to grant and revoke access to resources. How Will It Be Used? Identity Management will be used to: Implement a comprehensive identity lifecycle management process that Creates identities in the Registry. Assigns LoginIDs (also known as uniqnames). Populates IDs in the Directory. Manages data changes in the Registry and Directory. Depopulates IDs from the Registry and Directory. Facilitate the creation and management of non-person identities for the purpose of providing access to MCommunity systems and resources. Utilize Workflow to automate identity creation and management processes. 1 From 2 Non-person entries would include, for example, system identifiers such as root, bin, oracle, and others, which are specific to particular environments and ought to be reserved, but which need no other central resources. Non-person entries also include keytabs, special login identities, pt instances, and other resources used for automated processes. page 2

3 Business Process Model Dependencies MCommunity Identity Management is dependent on: Authoritative sources of identity data for creating and managing bona fide identities. These include, the Dearborn and Flint Banner systems, and the Development Constituent (DAC) system. The Sponsor System to create and manage non-bona fide identities The Identity Vault to store identity data and on other processes to manage the population and management of the identity data in the Directory; assign and manage uniqnames, UIDNumbers, and GIDNumbers; and to manage memberships in Institutional Roles. 3 Business Requirements These business requirements focus on meeting the needs of unit IT staff, unit administrative staff, and end users. For End Users (Interactive Access) 1. Uniqnames will be either assigned or self-chosen for an identity, ensuring uniqueness and naming standards. 2. Via Workflow, users with assigned uniqnames will be notified of their assigned LoginID and UMICH Kerberos password. For System Administrators (Programmatic Access) 3. Identity Management will create and manage Kerberos Principals for identities in MCommunity. 4. Any authoritative source will be able to create a new identity. 5. Identities will be assigned a system-generated unique identifier. 6. A process responsible for performing the consolidation of identity data from multiple sources and enforcing the data precedence rules defined by the Governance Board will be in place.) NOTE: The Governance Board has yet to define precedence of data from multiple sources, which will be present in the Directory. 7. Identity Management will populate identities into the Directory as specified by criteria set forth by the Governance Board. 3 See: University of Michigan, Enterprise Directory Services Phase 2 Governance Board Recommendations, Ann Arbor, Michigan, July This is included in Chapter 1 and is on the web. page 3

4 8. A process will be responsible for assigning unique identifiers (for example, UIDNumbers and GIDNumbers). 9. Identity Management will provide the ability to manage non-person identities in the Directory, which could include system related identities, or other types of objects (rooms, hardware, networks.) NOTE: This needs further definition to determine true needs and business relevance for MCommunity. Appendix 2-A: Populations and Data Sources Enterprise Directory Population Current employees & emeritus faculty at all three campuses Ann Arbor active students, including incoming students Flint active students, including incoming students Dearborn active students, including incoming students U-M Online (UMOL) subscribers Living alumni Other sponsored individuals Data Source M-Pathways database M-Pathways database Banner student information system Banner student information system ITCS UMOL database DAC database MCommunity will include a Sponsor System for managing identities for these individuals. Appendix 2-B: Search-Match and Minimum Data Requirements The minimum data required to create a UMID or match to an existing UMID is any one of the following three data combinations: Combination One Combination Two Combination Three First Name First Name First Name Last Name Last Name Last Name Social Security Number Social Security Number Date of Birth Date of Birth Gender Gender Address Address Additional data could include uniqname, UMID (if known), external system id, former names, and nicknames. Appendix 2-C: Identity Lifecycle Use-Case Analysis This use case provides an example of the many events that might occur during the lifecycle of a particular identity in the MCommunity system. Use Case Summary Li Ping, who lives in China, applies to the University of Michigan Engineering School. She matriculates, chooses liping as her uniqname, arrives in Ann Arbor two weeks before school starts, goes through orientation, and moves into a residence hall at the beginning of the term. During her first term, she applies for a job and is hired as a temporary employee. After her first year at U-M, she moves from the residence hall to an apartment. She decides to change her preferred name to Linda Ping. In her last semester of school, Linda marries and requests that her uniqname be changed to lsmith to match her new last name (Smith). The couple moves into a house. Linda s spouse uses her account (and, therefore, her identity) to send hate mail to the White House. The User Advocate steps in and temporarily disables the account. A divorce happens shortly afterwards. Linda changes her last name back to Ping and requests that her uniqname be changed back to liping. Linda graduates and moves to Houston. She loses access to her IFS file space when she is no longer a student. page 4

5 Assumptions is the authoritative data source for events such as matriculation and registration. Detailed Use Case Events Event Process Attributes in the Directory Li Ping applies to U-M and is admitted. She matriculates. Necessary information is entered in, and UMID is created or updated. contains l bio-demo and address data. Possible problem: Duplicate UMID exists and must be resolved. Initial student record (see schema) is sent to the Directory. User self registers uniqname and can go to cosign-enabled websites, register for classes, get housing, and so on. BCP is set up automatically. *Check with Novell about Identity/uniqname selfregistration process None Personal Data Academic Data Uniqname (liping) Password BCP Registry entry Information hidden in white pages Private flag on (will be brought to/confirmed with the Gov. Board) Institutional Roles None AA Authoritative Data Source She attends orientation and registers for classes. Gets M-card Enrollment data sent to Personal Data Academic Data Enrollment Data Uniqname Password BCP Registry entry AA Arrives on campus and starts classes. Becomes temp employee. Privacy flag is on. A week before classes start (?), the privacy flag is taken off, and actual FERPA starts? Job data added to FERPA flag change in BCP data and Directory entry Directory entry affiliation addition FERPA protection changes AA AA AA Temp Moves from res. hall to apartment. Takes summer classes in Dearborn. Changes preferred name. Address changes in Enrolls in Dearborn classes needs access to resources in Dearborn Name updated in Address updated in Dearborn student data Preferred name added to AA AA Dbn Dbn Enrolled AA Dearborn page 5

6 Event Process Attributes in the Directory Marries and requests uniqname change. Moves to the house. Husband abuses her login privileges. Campus ID (uniqname) changed in Any effect on job data? No Address change in User advocate finds out New uniqname - lsmith Address updated in Account is disabled How is account restored- by divorce? Institutional Roles AA AA AA Divorces. Any effect on job data? No AA Requests uniqname change. Graduates. Job ends. uniqname updated in Update to academic data Update to job data Uniqname changes to lping data removed data removed AA Authoritative Data Source Moves to Houston. Updates address with alumni office Address updated in See the MCommunity website for additional scenarios. page 6

Enterprise Directory Services Phase 2 Governance Board Recommendations

Enterprise Directory Services Phase 2 Governance Board Recommendations MAIS Information Technology Central Services and Michigan Administrative Information Services Enterprise Directory Services Phase 2 Governance Board Recommendations Populations and Data Sources The goal

More information

IT Commons Enterprise Directory Services Project

IT Commons Enterprise Directory Services Project Business Case and Funding Proposal IT Commons Enterprise Directory Services Project Table of Contents Executive Summary...3 Introduction...4 Statement of Opportunity...4 Current State of Directories...5

More information

DATA AND USER ACCESS POLICIES

DATA AND USER ACCESS POLICIES Contents UNIVERSITY OF CHICAGO ALUMNI & DEVELOPMENT DATABASE (GRIFFIN) DATA AND USER ACCESS POLICIES Approved by the Griffin Steering Committee 2/1/07 What is Griffin? Griffin Policies & Procedures Your

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Graduate Certificate Application Form and Checklist

Graduate Certificate Application Form and Checklist Graduate Certificate Application Form and Checklist 6530 Haven Hall, 505 South State Street, Ann Arbor, MI 48109 Tel: (734) 615-3275 Email Application to: cogsciprog@umich.edu www.lsa.umich.edu/weinberginstitute

More information

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15 Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an

More information

PROJECT CONTROL DOCUMENT

PROJECT CONTROL DOCUMENT PROJECT CONTROL DOCUMENT PERSISTENT EMAIL (AKA EMAIL MODEL) EM-PCD-001 Draft 06/09/2004 Prepared by Don D Worth UCLA PERSISTENT EMAIL Copyright 2002-2004, The Regents of the University of California All

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

PROGRAM OVERVIEW 4 PROGRAM GOVERNANCE 4 COURSEWORK 5

PROGRAM OVERVIEW 4 PROGRAM GOVERNANCE 4 COURSEWORK 5 University of Michigan Dearborn College of Education Health and Human Services Doctorate of Education Student Handbook Approved January 2015 Updated January 2015 2 MISSION STATEMENT: 3 ED. D. GUIDING PRINCIPLES

More information

Active Directory at the University of Michgan. The Michigan Way Since 2000

Active Directory at the University of Michgan. The Michigan Way Since 2000 Active Directory at the University of Michgan The Michigan Way Since 2000 Introductions Who I am: Christina Fleming (cmhf) Who you are: Your Name Your Department How long have you worked with AD? What

More information

University of Michigan STUDENT SERVICES: ADMISSIONS

University of Michigan STUDENT SERVICES: ADMISSIONS RACKHAM GRADUATE SCHOOL University of Michigan STUDENT SERVICES: ADMISSIONS 915 E. Washington Street 0120 Rackham Building Ann Arbor, MI 48109-1070 E-Mail: rackadmis@umich.edu www.rackham.umich.edu/prospective-students/admissions

More information

Identity & Access Management Lifecycle Committee. April 13, 2015 Monday Smith Center 561

Identity & Access Management Lifecycle Committee. April 13, 2015 Monday Smith Center 561 Identity & Access Management Lifecycle Committee April 13, 2015 Monday Smith Center 561 Agenda Special Guests: Employee IAM Lifecycle Onboarding Workflow Early Entry Into PeopleSoft, I-9 Process Special

More information

NDPERS Member Self Service Guide. Employee Guide. (Rev. 8.8.2014)

NDPERS Member Self Service Guide. Employee Guide. (Rev. 8.8.2014) NDPERS Member Self Service Guide Employee Guide (Rev. 8.8.2014) Table of Contents Getting Your NDPERS Member ID. Page 2 Instructions for Logging into PERSLink Member Self Service (MSS)..Page 3 13 What

More information

Implementation of Open Researcher and Contributor ID. (ORCID) at a Large Academic Institution

Implementation of Open Researcher and Contributor ID. (ORCID) at a Large Academic Institution Implementation of Open Researcher and Contributor ID (ORCID) at a Large Academic Institution Merle Rosenzweig*, AMLS Informationist Taubman Health Sciences Library, University of Michigan Abstract ORCID

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM

THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM I. Purpose & Scope THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s Red Flag Rules promulgated

More information

TSM Backup Service. Standard Service Level Agreement

TSM Backup Service. Standard Service Level Agreement TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and

More information

Georgia Tech Active Directory Policy

Georgia Tech Active Directory Policy Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review

More information

eschoolplus Katy Independent School District Enrollment Online

eschoolplus Katy Independent School District Enrollment Online Enrollment Online Table of Contents How to find Enrollment Online... 3 How to Register with Enrollment Online... 3 Create a New Enrollment Online Form... 3 Input/Select Data in the Form... 4 Student Information

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University

Enhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University Enhancing Collaboration by Extending the s Directory Infrastructure James Cramton Brown University Why We are Here De-duplication without all the facts Software in central business system identifies individuals

More information

Web Application Access

Web Application Access This guide provides information on: Establishing a WAM account for those individuals who do not have an EPA LAN account Logging on to Web Application Access (WAA) Viewing and entering your communities

More information

Olin Emergency Alert System (Olin EAS)

Olin Emergency Alert System (Olin EAS) 1. How do I log in to Olin EAS to register? Olin Emergency Alert System (Olin EAS) Log in to the system by clicking on the following link: Olin EAS Self-Registration Portal. Once you are on the site complete

More information

Steps for provider to acquire A&A login credentials and make renewal payment

Steps for provider to acquire A&A login credentials and make renewal payment Steps for provider to acquire A&A login credentials and make renewal payment *** PLEASE NOTE: The changes to System Registry are such that a provider can either pay their own renewal or designate a service

More information

NORTH CENTRAL MICHIGAN COLLEGE PARTNERSHIP

NORTH CENTRAL MICHIGAN COLLEGE PARTNERSHIP NORTH CENTRAL MICHIGAN COLLEGE PARTNERSHIP Through the NCMC partnership, students enrolled in the Young Americans Performance Certificate can opt to concurrently enroll in up to 12 credits each semester

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Oracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions

Oracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions Oracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions April 2011 9.0 Oracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions

More information

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization

More information

Chapter 11 - Fiscal and Business Affairs - Fees and Charges Page 11-1 Code of Policies CHAPTER 11 FISCAL AND BUSINESS AFFAIRS - FEES AND CHARGES

Chapter 11 - Fiscal and Business Affairs - Fees and Charges Page 11-1 Code of Policies CHAPTER 11 FISCAL AND BUSINESS AFFAIRS - FEES AND CHARGES Chapter 11 - Fiscal and Business Affairs - Fees and Charges Page 11-1 CHAPTER 11 FISCAL AND BUSINESS AFFAIRS - FEES AND CHARGES Sections: 11.010. Enrollment Fees 11.020. Housing Charges 11.030. Other Student

More information

Intro to AIS: Online Training Workbook

Intro to AIS: Online Training Workbook Intro to AIS: Online Training Workbook Office of the Registrar 10/19/2009 Version 1 Table of Contents MODULE 1: AIS OVERVIEW... 1 Online Training Instructions...1 Academic Information System at a Glance...1

More information

Learning About Financial Aid. Katherine Allen Financial Aid Workshop November 14, 2015

Learning About Financial Aid. Katherine Allen Financial Aid Workshop November 14, 2015 Learning About Financial Aid Katherine Allen Financial Aid Workshop November 14, 2015 Topics for Today College Costs Types of Financial Aid All About the FAFSA What Happens Next? Direct Cost Expenses paid

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

DISTANCE EDUCATION. Dual Credit Responsibilities. Table of Contents. Handbook. Introduction... 2. Welcome to EPCC Dual Credit Program!...

DISTANCE EDUCATION. Dual Credit Responsibilities. Table of Contents. Handbook. Introduction... 2. Welcome to EPCC Dual Credit Program!... I thin k Handbook DISTANCE EDUCATION Dual Credit Responsibilities Table of Contents Introduction... 2 Welcome to EPCC Dual Credit Program!... 3 Section 1: High School Instructional Facilitator Responsibilities...

More information

Active Directory User Management System (ADUMS)

Active Directory User Management System (ADUMS) Active Directory User Management System (ADUMS) Release 2.9.3 User Guide Revision History Version Author Date Comments (MM/DD/YYYY) i RMA 08/05/2009 Initial Draft Ii RMA 08/20/09 Addl functionality and

More information

FERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel

FERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA Q &A for Banner Users November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA tutorial http://www.dartmouth.edu/~reg/guides/ferpa/ FERPA = Family Educational

More information

How To Request A gtid# (Georgia Tech Identification Number)

How To Request A gtid# (Georgia Tech Identification Number) How To Request A gtid# (Georgia Tech Identification Number) Revised 01/2006 What Is a gtid#? The Georgia Tech Identification Number, or gtid#, serves as a unique identifier for each individual (constituent)

More information

Ethical Hacking Agreement for External Network Security Unannounced Penetration Test

Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Agreement made on the (date), between (Name of Consultant) of (street address, city, state, zip code), referred to herein

More information

Novell to Microsoft Conversion: Identity Management Design & Plan

Novell to Microsoft Conversion: Identity Management Design & Plan Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History

More information

Project Charter for ITPC-0375

Project Charter for ITPC-0375 9-16-2011 Page 1 of 12 Project Charter for ITPC-0375 Prepared by: Daryl Fritchey Project Name ITPC-0375 Identity and Access Management (IAM) Implementation IAM Executive Sponsors Chair Michael Hites, Executive

More information

Policy: Motor Vehicle Record Policy for Drivers of University Vehicles

Policy: Motor Vehicle Record Policy for Drivers of University Vehicles Policy: Motor Vehicle Record Policy for Drivers of University Vehicles Financial Affairs Department Insurance and Risk Management Effective: June 2005 Revised: January 2014 I. PURPOSE The purpose of this

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

Information Packet for AY2014 15 Undergraduate Fellowships For Current UM Ann Arbor Undergraduate Students. Important note to interested students

Information Packet for AY2014 15 Undergraduate Fellowships For Current UM Ann Arbor Undergraduate Students. Important note to interested students Information Packet for AY2014 15 Undergraduate Fellowships For Current UM Ann Arbor Undergraduate Students Important note to interested students University of Michigan International Institute is holding

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: University of Victoria Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA)

Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA) Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA) The FERPA training packet is part of the Information Security Awareness Training that must be completed by employees.

More information

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu Identity Access Management IAM 101 Mike Conlon Director of Data Infrastructure mconlon@ufl.edu 1 Three Processes Identity Answers the question Who is in our environment? Authentication Answers the question

More information

Ivy Tech Community College of Indiana

Ivy Tech Community College of Indiana Ivy Tech Community College of Indiana POLICY TITLE Family Educational Rights and Privacy Act (FERPA) POLICY NUMBER 3.6 (Former APPM 3.4) PRIMARY RESPONSIBILITY Student Affairs CREATION / REVISION / EFFECTIVE

More information

Welcome to SharpConnect

Welcome to SharpConnect Welcome to SharpConnect User Guide for Sharp Health Plan Brokers Version 1.1 www.sharphealthplan.com SharpConnect User Guide for Brokers page 1 TABLE OF CONTENTS Page I. Introduction to SharpConnect...

More information

User Accounts and Password Standard and Procedure

User Accounts and Password Standard and Procedure Office of the Vice President for Operations / CIO User Accounts and Password Standard and Procedure Issue Date: January 1, 2011 Information Security Office Effective Date: November 21, 2014 User Account

More information

Introduction to Geventis. Registration for the MIN Graduate School (MINGS)

Introduction to Geventis. Registration for the MIN Graduate School (MINGS) Fakultät für Mathematik, Informatik und Naturwissenschaften Introduction to Geventis Registration for the MIN Graduate School (MINGS) http://www.min.uni-hamburg.de/en/min-graduiertenschule.html Email mings@uni-hamburg.de

More information

Deficiencies in English or in academic preparation will lengthen your period of study.

Deficiencies in English or in academic preparation will lengthen your period of study. INFORMATION FOR USE IN COMPLETING THE FINANCIAL RESOURCES STATEMENT Under the regulations of the U.S. Immigration and Naturalization Service, the University of Michigan is required to obtain proof that

More information

Windows 2000 Planning at the University of Michigan

Windows 2000 Planning at the University of Michigan Windows 2000 Planning at the University of Michigan by MaryBeth Stuenkel Dave Detlefs Andrew Wilson (U-M Information Technology Division) 5/16/2000 Presented at the May 2000 Common Solutions Group meeting

More information

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction

Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy

More information

Oracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10

Oracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10 Oracle Human Capital Management Cloud Release 10 Oracle Human Capital Management Cloud Part Number E61339-03 Copyright 2011-2015, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,

More information

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS

STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act

More information

What is FERPA? This act is enforced by the Family Policy Compliance Office, U.S. Department of Educational, Washington, D.C.

What is FERPA? This act is enforced by the Family Policy Compliance Office, U.S. Department of Educational, Washington, D.C. What is FERPA? The Family Educational Rights and Privacy Act of 1974 (FERPA), as amended (also referred to as the Buckley Amendment), is a Federal law designed to protect the confidentiality of a student

More information

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming

More information

The Simple Steps For On-Line Enrollment

The Simple Steps For On-Line Enrollment Here is a simple approach to registering for Emeritus College classes on your computer. IMPORTANT: You must have a Student ID number & current semester online enrollment appointment date/time in order

More information

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention

Oklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention

More information

Email Encryption at the University of Miami Miller School of Medicine and University of Miami Health System

Email Encryption at the University of Miami Miller School of Medicine and University of Miami Health System Email Encryption at the University of Miami Miller School of Medicine and University of Miami Health System Introduction Email encryption is used to protect sensitive content that is sent from the UM Miller

More information

Michigan Student Data System IHE Request for UIC Collection

Michigan Student Data System IHE Request for UIC Collection Michigan Student Data System IHE Request for UIC Collection Navigating the CEPI website Gaining access to the MSDS C3 Overview XML Overview Demonstration Timing Resources and support 1 Navigating the CEPI

More information

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009

Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009 Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program

More information

Interacting with the Shared Services Center (SSC)

Interacting with the Shared Services Center (SSC) Interacting with the Shared Services Center (SSC) Providing a service that contributes to the mission of each unit is the true measure of success for the SSC. -Pamela Gabel, Executive Director 1 University

More information

Identity Access Management (IAM) FAQs

Identity Access Management (IAM) FAQs 1. What is the meaning of birthright privileges? A. Once an employee is hired to BU thru SAP (BUworks), they are entitled to the following birthright privileges. BUID BU Login and Kerberos Password Exchange

More information

Updated FAA Student Pilot Certificate Procedures

Updated FAA Student Pilot Certificate Procedures Step by Step Process for Issuance of St d t Pil t C tifi t U i Student Pilot Certificates Using Updated FAA Student Pilot Certificate Procedures New process effective April 1, 2016 and now allows CFIs

More information

UM Virtual Sites. March 11, 2010 by Lillian Chen, Research Specialist, lillianc@umich.edu. University of Michigan Virtual Sites... 1. MFile...

UM Virtual Sites. March 11, 2010 by Lillian Chen, Research Specialist, lillianc@umich.edu. University of Michigan Virtual Sites... 1. MFile... UM Virtual Sites March 11, 2010 by Lillian Chen, Research Specialist, lillianc@umich.edu Table of Contents University of Michigan Virtual Sites... 1 MFile... 5 University of Michigan Virtual Sites http://virtualsites.umich.edu/

More information

Principles FOR. Practice. for Career Services & Employment Professionals

Principles FOR. Practice. for Career Services & Employment Professionals Principles FOR Professional Practice for Career Services & Employment Professionals Principles for Professional Practice For Career Services & Employment Professionals Career services and employment professionals

More information

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009

Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009 Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009 Program Adoption The Community College System of New Hampshire ( CCSNH ) developed this Identity Theft Prevention

More information

Data Processing Agreement for Oracle Cloud Services

Data Processing Agreement for Oracle Cloud Services Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services

More information

Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009

Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009 Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009 Late last year, the Federal Trade Commission (FTC) and Federal banking agencies issued a regulation

More information

INVESTIGATION REPORT 173-2015

INVESTIGATION REPORT 173-2015 Saskatchewan Government Insurance November 12, 2015 Summary: Saskatchewan Government Insurance (SGI) proactively reported to the Office of the Information and Privacy Commissioner (OIPC) that it had received

More information

Phone Page Web Based Document Delivery

Phone Page Web Based Document Delivery Slide 1 This tutorial will introduce you to the Phone Page web-based document delivery system. Click on the top button to continue with the full tutorial or any of the other buttons to view portions of

More information

University of Maryland Active Directory Policies

University of Maryland Active Directory Policies University of Maryland Active Directory Policies Purpose of this policy Scope AD Forest Forest Schema & Data Visibility Account and Group Synchronization Account Creation and Password Forest Security Principle

More information

Quick Guide to Registering Your Staff

Quick Guide to Registering Your Staff Quick Guide to Registering Your Staff If your program is an EEC-licensed large or small group, school age, or family child care program or if you program is participating in the EEC-sponsored QRIS initiative,

More information

University of Southern California ivip Guest/Affiliate System

University of Southern California ivip Guest/Affiliate System University of Southern California ivip Guest/Affiliate System Online documentation available at: http://www.usc.edu/its/iam/ivip/ Questions about the USC ivip system can be directed to IAM-admin-l@usc.edu.

More information

School Building Leader (SBL) or School Building Leader/School District Leader (SDL) Certification Application Instructions for Graduate Candidates*

School Building Leader (SBL) or School Building Leader/School District Leader (SDL) Certification Application Instructions for Graduate Candidates* School Building Leader (SBL) or School Building Leader/School District Leader (SDL) Certification Application Instructions for Graduate Candidates* TEACH System * who have completed one of the Educational

More information

User Guide. COBRA Employer Manual

User Guide. COBRA Employer Manual Experience Excellence COBRA Manual User Guide COBRA Employer Manual COBRA Responsibilities and Deadlines Under COBRA, specific notices must be provided to covered employees and their families explaining

More information

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006

Single Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006 Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?

More information

1818 ACCess. Student. 1818 ACC vs. AP. 1818.slu.edu. Saint Louis Universty. Welcome to the 1818 Advanced College Credit Program!

1818 ACCess. Student. 1818 ACC vs. AP. 1818.slu.edu. Saint Louis Universty. Welcome to the 1818 Advanced College Credit Program! SPRING 2015 1818 ACCess ^ Student Welcome to the 1818 Advanced College Credit Program! 1818 Saint Louis Universty Advanced College Credit provides an opportunity for qualified high school juniors and seniors

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes

More information

FERPA and Homelessness A Technical Assistance Tool for NAEHCY Members

FERPA and Homelessness A Technical Assistance Tool for NAEHCY Members NATIONAL ASSOCIATION FOR THE EDUCATION OF HOMELESS CHILDREN Building Futures Through Education AND YOUTH The Family Educational Rights and Privacy Act FERPA and Homelessness A Technical Assistance Tool

More information

NYU Tuition Remission Benefit Plan For Dependent Children Undergraduate Degree Programs For Faculty, Administrators, and Professional Research Staff

NYU Tuition Remission Benefit Plan For Dependent Children Undergraduate Degree Programs For Faculty, Administrators, and Professional Research Staff NYU Tuition Remission Benefit Plan For Dependent Children Undergraduate Degree Programs For Faculty, Administrators, and Professional Research Staff CONTENTS I. Who is Covered Under this Plan?... 3 II.

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

CONSTITUENT RELATIONSHIP MANAGEMENT: PEOPLESOFT CRM 9.1 FOR HIGHER EDUCATION

CONSTITUENT RELATIONSHIP MANAGEMENT: PEOPLESOFT CRM 9.1 FOR HIGHER EDUCATION CONSTITUENT RELATIONSHIP MANAGEMENT: PEOPLESOFT CRM 9.1 FOR HIGHER EDUCATION Colleges and universities continue to experience unprecedented challenges: increased expectations from their constituents for

More information

Banner Self Service for students

Banner Self Service for students Banner Self Service for students revised April 5, 2006 Table of Contents Get Your UNC Charlotte ID Logging in to Self Service Banner Forgot Your Password? Checking Your Holds Checking Your Registration

More information

AUBURN UNIVERSITY. Human Resource Development Policies (Administrative/Professional and University Staff)

AUBURN UNIVERSITY. Human Resource Development Policies (Administrative/Professional and University Staff) 7.0 Human Resource Development Policies AUBURN UNIVERSITY Human Resource Development Policies (Administrative/Professional and University Staff) 7.1 Purpose - The interests of the University are best served

More information

Contents. U-M Flint Campus UHR - Flint 213 University Pavilion 303 E. Kearsley Flint, MI 48502-1950 810-762-3150 8 a.m. to 5 p.m., Monday Friday, EST

Contents. U-M Flint Campus UHR - Flint 213 University Pavilion 303 E. Kearsley Flint, MI 48502-1950 810-762-3150 8 a.m. to 5 p.m., Monday Friday, EST Benefits Information The HR/Payroll Service Center can answer many of your benefits questions. Call 734-615-2000 or toll free 1-866-647-7657. Service Center Representatives are available Monday Friday,

More information

Law College Computer and Technology Information

Law College Computer and Technology Information Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow

More information

Caltech Career Development Center (CDC) On-Campus Recruiting Policies for Recruiters

Caltech Career Development Center (CDC) On-Campus Recruiting Policies for Recruiters Caltech Career Development Center (CDC) On-Campus Recruiting Policies for Recruiters Introduction All employment professionals participating in the On-Campus Recruiting Program are required to work within

More information

Identity Management Capabilities Rise in the Cloud

Identity Management Capabilities Rise in the Cloud Fischer International Identity Identity Management Made for Higher Education IDENTITY MANAGEMENT CASE STUDY Identity Management Capabilities Rise in the Cloud Maryland Institute College of Art Executive

More information

Siebel HelpDesk Guide. Version 8.0, Rev. C March 2010

Siebel HelpDesk Guide. Version 8.0, Rev. C March 2010 Siebel HelpDesk Guide Version 8.0, Rev. C March 2010 Copyright 2005, 2010 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain proprietary

More information

COBRA Participant Guide

COBRA Participant Guide COBRA Participant Guide COBRA Participant Guide 1 Table of Contents Introduction........................................... 3 COBRA Checklist........................................ 3 General Timeline

More information

Ithaca College Web Policy

Ithaca College Web Policy Ithaca College Web Policy Scope of Policy This policy applies to websites and applications that are owned and operated by, or operated on behalf of, Ithaca College. Purpose of Ithaca College Websites Ithaca

More information

Preparing to Serve: Online Training Modules

Preparing to Serve: Online Training Modules Preparing to Serve: Online Training Modules MASSEN, A. AND KOWALEWSKI, B. (EDS.) COPYRIGHT 2010. WEBER STATE UNIVERSITY PREPARING TO SERVE: ONLINE TRAINING MODULES PROFESSIONALISM CULTURAL SENSITIVITY

More information

HarePoint Workflow Extensions for Office 365. Quick Start Guide

HarePoint Workflow Extensions for Office 365. Quick Start Guide HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of

More information

Initial Teacher Certification Application Instructions for Undergraduate Adolescence Candidates *

Initial Teacher Certification Application Instructions for Undergraduate Adolescence Candidates * Initial Teacher Certification Application Instructions for Undergraduate Adolescence Candidates * TEACH System * who have completed a registered undergraduate initial teacher certification program at St.

More information

HP Change Configuration and Release Management (CCRM) Solution

HP Change Configuration and Release Management (CCRM) Solution HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document

More information

Identity Management System: Architecture

Identity Management System: Architecture Identity Management System: Architecture Table of Contents 1. Overview and Goals...3 2. Design...4 1. Overview and Goals The Identity Management (IdM) team at UNC Chapel Hill has identified a set of core

More information