Data Access Procedures
|
|
- Edith Elliott
- 8 years ago
- Views:
Transcription
1 Rev Effective Date: November 2, 2005 Last Review Date: February, 2015 Directly in support of the following Policy Document(s): Georgia Institute of Technology Data Access Policy The following are responsible for the accuracy of the information contained in this document Responsible University Officer Associate Vice President / Associate Vice Provost for Information Technology and Chief Information Officer (CIO) Responsible Coordinating Office Office of Information Technology (OIT) 1. Executive Summary This document is in direct support of the Georgia Institute of Technology Data Access Policy and is included by reference in the policy. This document sets forth guidelines and procedures for requesting access to Institute Data, and in particular to Sensitive Data as defined in the Data Access Policy. This document shall be subject to periodic changes and updates, as necessary, independent of the policy document itself. 2. Procedures (NOTE: Phrases shown in italics at their first occurrence in this document are defined in the associated IT Policy Definitions - Standards Document No. 05.GIT.170) a. Data Coordinators assist with data classification. Data Coordinators grant access to the data within their purview according to criteria defined for specific access requirements. For example, some types of access require training, the establishment of user accounts, and awareness of federal or State guidelines restricting data access. b. Authorized Requesters represent a campus unit or group of campus units, and are appointed by someone with at least unit head authority. Every organization determines the best way to assign this responsibility based upon workflow, organizational structure, and job responsibilities. c. Authorized Requesters verify individual access requirements, and forward access requests to the appropriate Data Coordinator. Authorized Requesters assure that access Page 1 of 5
2 privileges are kept current with changes in personnel status for individuals in the unit(s) represented. d. Data Coordinators will provide assistance as required to Authorized Requesters to assure that access privileges are granted in accordance with the Policy. e. The requests are initiated via or applicable web form, and forwarded to the appropriate Data Coordinator. If the request requires electronic access to data, it is then forwarded to the appropriate Data Administrator for action. f. Access requests should include the following information: Department Name User Name User ID (if one has already been assigned) Job Title Phone Number What Data/Role & Why (Data Coordinators will provide assistance) Access End Date (some individuals only require temporary access) All expected user groups for the data requested (i.e. will the data be released to third parties?) Note: Any change or extension to the original intended use of the data requested (as documented in the original access request), such as a new application being developed using data for which access was previously granted, shall require a new access request explicitly documenting such change or extension. g. All data access requests must have a minimum of three certifications: i) Data User: acknowledging having received the Institute s Data Access Policy; ii) Supervisor/Departmental Certification: authorizing data user to access data based on job responsibilities, and verifying the accuracy of the information conveyed on the data access request form; and iii) Technical Certification: approval of the corresponding Technical Authority for the data user s department, certifying the technical compliance of the client and/or server machines to be used by the data user to access the information. Additional certifications may be required by individual department policies and/or systems. h. If an individual is requesting access to data that has associated prerequisites, such as Banner and PeopleSoft training, or review of Family Education Rights and Privacy Act (FERPA) and/or Gramm-Leach-Bliley Act (GLBA) Sensitive Data Access guidelines, then the Data Coordinator will ensure that the prerequisites have been met prior to approval. i. Data Coordinators and Data Administrators will maintain electronic archives of all requests. Data Administrators will serve as the point of contact for related audit reviews. j. Data Administrators will maintain a repository of information regarding the data classified by the Data Stewards and Coordinators. Page 2 of 5
3 Procedure for Requesting Data Access to Institute-wide Systems (as of February 2015) Authorized Requester Initiate request to create, change, or terminate access privileges. Three signatures required for new requests: User, Supervisor, Technical Certification (Define access requirements) Data User Requires access in the performance of job responsibilities. Appropriate Data Coordinator Cargill, Shalonda PeopleSoft HR GTDW Employee Data Hayes, Zach Banner Student GTDW* Student Data Gibson, Carol PeopleSoft Financial GTDW Financial Data Mason, Sandy PeopleSoft SPD PeopleSoft Grants GTDW* SPD Data GTDW* Grants Data Hutchison, Garry (Duane) Office of Sponsored Programs Bamburowski, David Graduate Admissions Cozzens, Susan Faculty Data (Non-HR Data) Yes Training required? No request includes: 1. Department 2. User Name 3. User ID 4. Job Title 5. Phone Number 6. What Data & Why 7. Access End Date 8. List of all intended user groups for requested data (incl. third parties). *GTDW=GT Data Warehouse Approve & forward notification Data Administrator Review requests Enable access Maintain authorization records Authorization Form User Packet Obtain Authorization Pick up copy Annotate & forward notification Data Coordinator Matches to request Authorized Requester Matches to request Data User Page 3 of 5
4 Chief Stewards, Data Stewards, and Primary Data Coordinators for Institute-wide Systems (as of February 2015) Reta Pikowsky, Registrar Zachary Hayes Associate Registrar Kim Harrington Associate Vice President - OHR Shalonda Cargill, Director HR Information Services Jim Fortner, Associate Vice President - Financial Svcs Carol Gibson, Associate Controller Banner Student Information Faculty Access System Data Warehouse Student Data General Student Information Student Major & Degree(s) Transfer Credits Student GT Grades Student Term Data (Hours & GPA) Course Instructors Current / Future Course Schedule(s) Student Activities PeopleSoft HR/Payroll Data Warehouse Employee Data HRMS Payroll PeopleSoft Financials PeopleSoft SPD Data Warehouse Financial Services Data Chart of Accounts Ledger Posting Detail Grants & Contracts Accounting Salary, Planning & Distribution Sandy Mason, Director - Grants & Contracts Accts. Jilda Garton, Associate Vice Provost - OSP Duane Hutchison, Director - OSP David Bamburowski, Director - Graduate Studies Susan Cozzens, Vice Provost Office of Sponsored Programs OSP System Graduate Admissions Data Faculty Data - Non HR Data Page 4 of 5
5 3. Revision History Revision Number Author Description Jimmy Lummis Updated Data Stewards and Coordinators Jimmy Lummis Updated Data Access Request diagram Herb Baines Updated Data Stewards diagram Richard Biever Updated Data Coordinator contact information Richard Biever Updated Data Coordinator contact information. Page 5 of 5
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,
More informationInformation Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
More informationHR Function Access to Panels or Application Contact Information
GA Tech Administrative Systems: Training and Access Most often, training is required to request access to Georgia Tech s administrative systems. Use the charts to determine where systems are located on
More informationHR Inquiry and HR Ad-Hoc Report training will be combined and offered as a tutorial.
Effective September 2013 HR Inquiry and HR Ad-Hoc Report training will be combined and offered as a tutorial. Use this training guide for overview information. The tutorial can be access from the OHR Training
More informationRowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationInformation Security Policy
Information Security Policy Introduction The purpose of the is policy is to protect Rider University information resources from accidental or intentional unauthorized access, modification, or damage and
More informationEffort Certification Training. Regulatory Requirements
Effort Certification Training Regulatory Requirements What is Effort Reporting? Mechanism for Confirming Salary and Wage Charges to Sponsored Agreements - Confirms Salary Charged to Sponsored Agreements
More informationAssertion Control objectives Controls Tests of controls Occurrence and existence
Internal Control over Payroll Assertion Control objectives Controls Tests of controls Occurrence and existence Payment is made only to bona fide employees of the entity. Segregation of duties between HR
More informationIntro to Human Resources @ Georgia Tech. Training inquires: adminsystraining@gatech.edu
Intro to Human Resources @ Georgia Tech Training inquires: adminsystraining@gatech.edu Georgia Georgia Tech Tech Human Human Resources Resources Tutorial Objectives Overview of OHR and Internal Departments
More informationContact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
More informationINFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES
INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationBoston College Office for Sponsored Programs BUSINESS PROCESS TRACKING MANDATORY COST SHARING IN PEOPLESOFT GRANTS
Boston College Office for Sponsored Programs BUSINESS PROCESS TRACKING MANDATORY COST SHARING IN PEOPLESOFT GRANTS Table of Contents Business Process Description...3 Key Assumptions...3 Mandatory Cost
More informationIT Investment and Business Process Performance: Survey Questionnaire
IT Investment and Business Process Performance: Survey Questionnaire Thank you for participating in the study being conducted by the EDUCAUSE Center for Applied Research (ECAR). This survey is a critical
More informationInformation Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationBUSINESS CASE FOR GEORGIA TECH ENTERPRISE DATA MANAGEMENT
BUSINESS CASE FOR GEORGIA TECH ENTERPRISE DATA MANAGEMENT MV Page 1 PROJECT BUSINESS CASE Project Identification Project Name: Enterprise Data Management Date: _07/19/2012 Business Unit/Program Area: Decision
More informationWhen Completed: This procedure is performed whenever personnel actions are needed.
Effective Date: April 27, 2015 Revised Date: April 20, 2015 Prepared By: Stacie Bell Approved By: Mona Adkins-Easley Next Review Date: April 27, 2016 Title: Purpose: Scope: Personnel Action Form Procedure
More information1. Prior to registering, access SalukiNet for information on registration eligibility. Register for classes using SalukiNet.
Course registration process It is recommended that you register for courses as soon as possible, based on the registration schedule, and ideally no later than the end of the prior semester to the term
More informationPolicy and Procedures Date: April 1, 2008
Virginia Polytechnic Institute and State University No. 7100 Rev.: 4 Policy and Procedures Date: April 1, 2008 Subject: Administrative Data Management and Access Policy Contents 1. Premise and Purpose...
More informationCITY UNIVERSITY OF NEW YORK EMPLOYEE ACCESS TO THE STUDENT INFORMATION MANAGEMENT SYSTEM AT SELECTED CAMPUSES. Report 2007-S-23
Thomas P. DiNapoli COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE GOVERNMENT ACCOUNTABILITY Audit Objective... 2 Audit Results - Summary... 2 Background... 3 Audit Findings and
More informationTitle: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
More informationUND School of Medicine & Health Sciences Principal Investigator Reference Guide
UND School of Medicine & Health Sciences Principal Investigator Reference Guide TABLE OF CONTENTS Table of Contents 2 Introduction 3 Responsibilities of the Principal Investigator 4 Signing Legal Grant
More informationTexas A&M University - Commerce: Review of Faculty Human Resources Processes PROJECT SUMMARY. Summary of Significant Results
PROJECT SUMMARY Overview Table of Contents Project Summary... 1 Detailed Observations... 3 Basis of Review... 10 Audit Team Information... 11 Distribution List... 11 Processes and controls at Texas A&M
More informationSt. John Fisher College Banner/ApplicationXtender Access Request Form
St. John Fisher College Banner/ApplicationXtender Access Request Form The Banner/ApplicationXtender Access Request Form consists of five pages, this instruction page and four pages for access request of
More informationPolicy and Procedures Date: February 15, 2005
Virginia Polytechnic Institute and State University No. 3105 Rev.: 1 Policy and Procedures Date: February 15, 2005 Subject: Effort Certification 1. Purpose...1 2. Policy...1 3. Procedures...2 3.1 General
More informationVirginia Commonwealth University Information Security Standard
Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,
More informationWhen to use this form
MLT 4th Floor When to use this form This form should be used when making changes to an employee's current job details. The form is completed online and then routed electronically to the appropriate approvers.
More informationU.S. Nuclear Regulatory Commission
ML111170543 U.S. Nuclear Regulatory Commission Privacy Impact Assessment (Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy Act, the
More informationNew Student Orientation
New Student Orientation Welcome to Ivy Tech Online - Ohio We are happy you have taken the next step toward enrolling at Ivy Tech Online Ohio, and we look forward to working with you as you begin your educational
More informationThe Nuts and Bolts of Payroll
The Nuts and Bolts of Payroll The Nuts and Bolts of Payroll Susan Smith Lead PIMS Analyst/Leave Accounting SME Intro Payroll Overview LAPP Making the Most of CMS Self Service Karen Batten Payroll Technical
More informationDepartment or unit: Job activities % of time New duty or change?
HARVARD HUMAN RESOURCES Position Documentation and Questionnaire Form (PDF/PDQ) This form is being used for the purpose of: Job review/reclassification New position classification Instructions: Please
More informationInformation Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
More informationData Management Standard
Data Management Standard Revision: Version 1.0 Date: 11/2015 Status: Approved by ISAC, Reviewed by Chancellor s Cabinet 1. Objectives Page 1 2. Scope Statement. Page 1 3. Requirements..Page 1 4. Definitions
More informationBERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
More informationARTICULATION AGREEMENT
ARTICULATION AGREEMENT FOR THE BACHELOR OF SCIENCE DEGREE INFORMATION SECURITY AND INTELLIGENCE BETWEEN FERRIS STATE UNIVERSITY AND DELTA COLLEGE THIS ARTICULATION AGREEMENT (hereinafter Agreement ) is
More informationElectronic System Access Request (ebar) Guide
Electronic System Access Request (ebar) Guide The Electronic System Access Request (ebar) is the current way to request access for all Banner Systems: Banner Student Information (SIS), Student Accounts
More informationINDIANA UNIVERSITY EAST-EARLHAM COLLEGE COOPERATIVE AGREEMENT FOR THE BACHELORS DEGREE IN ELEMENTARY OR SECONDARY EDUCATION (Under Review)
INDIANA UNIVERSITY EAST-EARLHAM COLLEGE COOPERATIVE AGREEMENT FOR THE BACHELORS DEGREE IN ELEMENTARY OR SECONDARY EDUCATION (Under Review) ADMISSION TO TEACHER EDUCATION AT EITHER INSTITUTION: 1. Cumulative
More informationSUMMARY OF POSITION ROLE/RESPONSIBILITIES:
SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant
More informationOffice of Human Resources Department of Compensation & Performance Management epar Smart Sheets & Business Rules
Office of Human Resources Department of Compensation & Performance Management epar Smart Sheets & Business Rules 7/1/2013 epar Smart Sheets & Business Rules 1 Creating a New Position (Offline Process)
More informationInformation Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
More informationHR Web Changes Resulting from Project Compass Effective September 1, 2009
EMORY HR WEB HR Web Changes Resulting from Project Compass Effective September 1, 2009 HR Web and PeopleSoft Financials 9.0 With the introduction of a new enterprise-wide financial accounting system, PeopleSoft
More informationHAVERFORD COLLEGE IITS: POLICY AND PLANNING
Contents: 1. Preface 2. Policy 3. Audit and Compliance Section 1. Preface A. Name. The formal name of this policy is the Policy. B. Status of This Policy 1. Draft. Completed 4/11/2013 2. Public Review
More information2. Scope This policy addresses all web sites hosted by the central web hosting service.
OIT Web Hosting Policy Rev. 4.04 Effective Date: Last Revised: January 3, 2011 January 3, 2011 The following are responsible for the accuracy of the information contained in this document Responsible University
More informationIndependent Contractor Policy
Independent Contractor Policy Policy Contents Policy Statement Reason for Policy Who Should Read this Policy Policy Text Procedures Related Information Definitions Additional Contacts Forms Responsibilities
More informationThe UMC Web Engine - Model For Success
UNIVERSITY OF MISSISSIPPI MEDICAL CENTER for the UMC Web Environment Page 1 of 12 1.0 PURPOSE The purpose of the is to establish requirements and provide instructions as governed by the Information Policy.
More informationProfessional Position Description Section I Position Information Position Title
Professional Position Description Section I Position Information Update Only Classification Review Position Title Coordinator, Payroll Position # 999706 Department Human Resources Classification Level
More informationASU Payroll Audit Number 07-01 April 2007
Audit Number 07-01 April 2007 University Audit and Advisory Services EXECUTIVE SUMMARY Scope and Objective During fiscal year ended June 30, 2006, Arizona State University (ASU) paid over 6,500 employees
More informationGeorgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
More informationOhio Wesleyan University Search/Recruitment Procedures
Position Title: Search Number: #1314 - Search Start Date: ****************************************************************************** The latest version of the search/recruitment paperwork is attached
More informationActionable Intelligence: Big Data for Student Success. Brian A. Haugabrook, Valdosta State University Barrie D. Fitzgerald, Valdosta State University
Actionable Intelligence: Big Data for Student Success Brian A. Haugabrook, Valdosta State University Barrie D. Fitzgerald, Valdosta State University Strategic Goals 1. Strategic business intelligence for
More informationHOWARD UNIVERSITY POLICY
HOWARD UNIVERSITY POLICY Policy Number: 300-001 Policy Title: ACCOUNTS PAYABLE: PAYMENTS TO VENDORS Responsible Officer: Chief Financial Officer Responsible Office: Office of the Chief Financial Officer
More information1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role
1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role Definition of Responsibilities 1. Department Manager-Responsible official appointed by the Dean or Department
More informationRecords Management Manual of the University of Nevada Las Vegas Table of Contents
Records Management Manual of the University of Nevada Las Vegas Table of Contents Part 1: Overview of Records Management at the University of Nevada Las Vegas... 2 1.1 PROGRAM RATIONALE, RESPONSIBILITIES
More informationAPPENDIX 1. CLASSIFIED EMPLOYEE COMPENSATION MARKET STUDY JOB EVALUATION METHODOLOGY REVIEW And COMPENSATION REPORTING STRUCTURE DESIGN
APPENDIX 1 CLASSIFIED EMPLOYEE COMPENSATION MARKET STUDY JOB EVALUATION METHODOLOGY REVIEW And COMPENSATION REPORTING STRUCTURE DESIGN REQUEST FOR PROPOSALS (RFP) NO. 15191 April 15, 2015 Project Background
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
More informationLANGSTON UNIVERSITY STUDENT QUICK GUIDE FROM THE REGISTRAR S OFFICE
LANGSTON UNIVERSITY STUDENT QUICK GUIDE FROM THE REGISTRAR S OFFICE PRESENTED BY KATHY SIMMONS, UNIVERSITY REGISTAR FALL 2013 FERPA Langston University makes every effort to comply with the Family Educational
More informationGraduate-Level, Academic Credit Certificate Programs
Graduate-Level, Academic Credit Certificate Programs From the Policies and Procedures for Administering Graduate Student Programs manual: All Graduate Certificate Programs must be approved by the Graduate
More informationIndex .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
More informationThis document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance:
This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: Credits, program length, and tuition Student complaints Transfer
More informationInstitutional Data Governance Policy
Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.
More informationInformation Security Operational Procedures Banner Student Information System Security Policy
Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides
More informationSalary and Planning Distribution (SPD) Ad-Hoc Reporting Tool
Salary and Planning Distribution (SPD) Ad-Hoc Reporting Tool Georgia Institute of Technology HRMS 8.8 Systems Training Copyright Georgia Institute of Technology 2004 Table of Contents Getting Started...3
More informationTeachers - Alternative Certification Program Information and Checklist
Part B Teachers - Alternative Certification Program Information and Checklist ACP Information & Checklist Salary Schedule Teacher and Nurses Recruitment Referral Form ACP Instructions Staff Development
More informationPosition Reports To: Associate Dean, Budget & Operations
POSITION DESCRIPTION Department: CHABSS (Arts) Position Reports To: Associate Dean, Budget & Operations Working Title: Administrative Support Assistant Classification: Administrative Support Assistant
More informationOnline Tuition Concession Faculty and Staff. July 2015 Human Resources Wake Forest University
Online Tuition Concession Faculty and Staff July 2015 Human Resources Wake Forest University 1 Table of Contents Accessing the Tuition Concession Form 3 Submitting a Request 4 Tracking a Request 14 Contact
More informationHUMAN RESOURCES MANAGEMENT SYSTEM. PeopleSoft Version 8.9 epar
HUMAN RESOURCES MANAGEMENT SYSTEM PeopleSoft Version 8.9 epar University of Houston System Training/ Reference Guide Human Resource Information Management Mandi Oliver 713-743-0903 TABLE OF CONTENTS Chapter
More informationInformation Security
Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...
More informationHOSTING INTERNATIONAL EXCHANGE VISITORS
I. GENERAL POLICY HOSTING INTERNATIONAL EXCHANGE VISITORS 1. WWU sponsors J-1 visas for international faculty, scholars, artists, and graduate students, whether salaried or non-salaried, who engage in
More information7/11/2012 ILLINOIS INSTITUTE OF TECHNOLOGY (IIT) STUDENT IPAD INITIATIVE
Leveraging Business Intelligence and ipad Applications for Financial Reporting Brian Laffey, AVP Finance and Controller Illinois i Institute t of Technology 1 Agenda University s ipad Initiative Financial
More informationStaffing and Classification Procedures
Staffing and Classification Procedures Preface These procedures apply to staff employed by the University of Southern California. In the event of a discrepancy between procedures, guidelines and a collective
More informationTUITION ASSISTANCE PLAN & TUITION REIMBURSEMENT PLAN. Harvard University
TUITION ASSISTANCE PLAN & TUITION REIMBURSEMENT PLAN Harvard University C O N T E N T S Tuition Assistance Plan (TAP).. 2 What is the Tuition Assistance Plan? Tuition Reimbursement Plan (TRP)... 2 What
More informationUNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07
UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM SECTION: Information Services NUMBER: 07.A.07 AREA: Computing Services SUBJECT: Use of Electronic Messaging Services by Employees 1. PURPOSE The purpose
More informationAchieving HIPAA Compliance with Identity and Access Management
Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views
More informationUniversity of San Diego University Audit Office Self-Audit Tool. A - General
University of San Diego University Audit Office Self-Audit Tool Department: Budget Officer: Completed by: Date: The Self-Audit Tool is a guide and is not all-inclusive. Yes indicates a needed control is
More informationInformation Security Plan May 24, 2011
Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised
More informationHuman ResourcesHuman Resources - Project Overview
PROJECT SUMMARY Overview Table of Contents Project Summary... 1 Detailed Observations... 3 Basis of Review... 8 Audit Team Information... 9 Distribution List... 9 Overall, Texas A&M International University
More informationThe Applicant Tracking System Tool for Supporting the Requisition Lifecycle
The Applicant Tracking System Tool for Supporting the Requisition Lifecycle Process Guide Contact Information: For questions or additional information, send an email to ats@gatech.edu What s Included in
More informationAUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM
PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes
More informationDeveloping a Data Governance System
UNIVERSITY BUSINESS EXECUTIVE ROUNDTABLE Developing a Data Governance System Custom Research Brief October 22, 2010 RESEARCH ASSOCIATE Jeff Durkin TABLE OF CONTENTS I. Research Methodology II. Executive
More informationCOOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES
COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES Career and Technical Education Division Career and Technical Education Initiatives We Make Houston Work Houston Community College Last Revised 05/01/13 Dr.
More informationGEORGIA STATE UNIVERSITY BYRDINE F. LEWIS SCHOOL OF NURSING and HEALTH PROFESSIONS
1 GEORGIA STATE UNIVERSITY BYRDINE F. LEWIS SCHOOL OF NURSING and HEALTH PROFESSIONS SELF-MANAGED APPLICATION INSTRUCTIONS Please Note The preferred method is to submit an application online at http://nursing.gsu.edu/academics/admissions/undergraduate/application-and-requirements/.
More informationCriminal Justice Internship Program CJ 4488, CJ 4489, & CJ 4490
Criminal Justice Internship Program CJ 4488, CJ 4489, & CJ 4490 This policy governs the Internship Program for students majoring in Criminal Justice at Troy University. Participation in the Internship
More informationData Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
More informationPRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
More informationGuidelines for Submitting Job Reviews AUPE and MaPS
Guidelines for Submitting Job Reviews AUPE and MaPS Total Rewards April 2015 2 TABLE OF CONTENTS Human Resources Website I. Introduction... 3 II. Purpose of a Job Review... 3 III. Job Review Process...
More informationHIGH SCHOOL TRANSCRIPT
SCCCD Clovis Community College Center The procedures for applying to the are listed below: 1. The intent of this program is to provide college enrichment opportunities for a limited number of eligible
More informationFaculty Achievement Award in Research (FAAR) Authorization Form FY10
School of Medicine Campus End User Instructions -Associate Dean for Research and Faculty Affairs FORM Faculty Achievement Award in Research (FAAR) Authorization Use: To provide information regarding the
More informationUniversity of Hawai i Executive Policy on Data Governance (Draft 2/1/12)
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) I. Definition Data governance is the exercise of authority and control (planning, monitoring, and enforcement) over the management
More information2 Soi Kalong 2, Nonthaburi Rd., Tasai, Muangnonthaburi, Nonthaburi 11000 P: 0-2580-8060 F: 0-2580-6878 WWW.CSC.CO.TH
myhr Feature WWW.CSC.CO.TH Contents Page Title Introduction... 1 SMART E-Profile... 1 Payroll... 5 Recruitment... 6 Appraisal... 8 Training... 9 Time Attendance... 11 Workflow... 13 myhr Network Diagram...
More information1. Project Charter. Sheri Kellogg. Phyllis Short. Project Title: PeopleSoft CSS / HCM Split Description:
1. Stakeholder Name Cecilia Castellano Chris Cox Laura Emch Andy Grant Sheri Kellogg Chastity McCartney Beth Ann Rife Phyllis Short Michelle Simmons Brian Skelding Sharon Swartz Department Admissions Registrar
More informationPolicy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE:
Policy No: TITLE: AP-AA-17.2 Data Classification and Data Security ADMINISTERED BY: Office of Vice President for Academic Affairs PURPOSE EFFECTIVE DATE: CANCELLATION: REVIEW DATE: August 8, 2005 Fall
More informationRowan University IT ACQUISITION POLICY
Rowan University IT ACQUISITION POLICY Effective: January 2014 Data Governance: IT Acquisition Policy Page 1 of 6 IT ACQUISITION POLICY Title: Data Governance: IT Acquisition Policy Subject: Information
More informationWelcome to Ivy Tech Online McDonald s Employee Management Program
Welcome to Ivy Tech Online McDonald s Employee Management Program We are happy you have taken the next step toward enrolling at Ivy Tech Online McDonald s Employee Management Program, and we look forward
More informationCalifornia State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
More informationSecurity Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
More information