Data Access Procedures

Size: px
Start display at page:

Download "Data Access Procedures"

Transcription

1 Rev Effective Date: November 2, 2005 Last Review Date: February, 2015 Directly in support of the following Policy Document(s): Georgia Institute of Technology Data Access Policy The following are responsible for the accuracy of the information contained in this document Responsible University Officer Associate Vice President / Associate Vice Provost for Information Technology and Chief Information Officer (CIO) Responsible Coordinating Office Office of Information Technology (OIT) 1. Executive Summary This document is in direct support of the Georgia Institute of Technology Data Access Policy and is included by reference in the policy. This document sets forth guidelines and procedures for requesting access to Institute Data, and in particular to Sensitive Data as defined in the Data Access Policy. This document shall be subject to periodic changes and updates, as necessary, independent of the policy document itself. 2. Procedures (NOTE: Phrases shown in italics at their first occurrence in this document are defined in the associated IT Policy Definitions - Standards Document No. 05.GIT.170) a. Data Coordinators assist with data classification. Data Coordinators grant access to the data within their purview according to criteria defined for specific access requirements. For example, some types of access require training, the establishment of user accounts, and awareness of federal or State guidelines restricting data access. b. Authorized Requesters represent a campus unit or group of campus units, and are appointed by someone with at least unit head authority. Every organization determines the best way to assign this responsibility based upon workflow, organizational structure, and job responsibilities. c. Authorized Requesters verify individual access requirements, and forward access requests to the appropriate Data Coordinator. Authorized Requesters assure that access Page 1 of 5

2 privileges are kept current with changes in personnel status for individuals in the unit(s) represented. d. Data Coordinators will provide assistance as required to Authorized Requesters to assure that access privileges are granted in accordance with the Policy. e. The requests are initiated via or applicable web form, and forwarded to the appropriate Data Coordinator. If the request requires electronic access to data, it is then forwarded to the appropriate Data Administrator for action. f. Access requests should include the following information: Department Name User Name User ID (if one has already been assigned) Job Title Phone Number What Data/Role & Why (Data Coordinators will provide assistance) Access End Date (some individuals only require temporary access) All expected user groups for the data requested (i.e. will the data be released to third parties?) Note: Any change or extension to the original intended use of the data requested (as documented in the original access request), such as a new application being developed using data for which access was previously granted, shall require a new access request explicitly documenting such change or extension. g. All data access requests must have a minimum of three certifications: i) Data User: acknowledging having received the Institute s Data Access Policy; ii) Supervisor/Departmental Certification: authorizing data user to access data based on job responsibilities, and verifying the accuracy of the information conveyed on the data access request form; and iii) Technical Certification: approval of the corresponding Technical Authority for the data user s department, certifying the technical compliance of the client and/or server machines to be used by the data user to access the information. Additional certifications may be required by individual department policies and/or systems. h. If an individual is requesting access to data that has associated prerequisites, such as Banner and PeopleSoft training, or review of Family Education Rights and Privacy Act (FERPA) and/or Gramm-Leach-Bliley Act (GLBA) Sensitive Data Access guidelines, then the Data Coordinator will ensure that the prerequisites have been met prior to approval. i. Data Coordinators and Data Administrators will maintain electronic archives of all requests. Data Administrators will serve as the point of contact for related audit reviews. j. Data Administrators will maintain a repository of information regarding the data classified by the Data Stewards and Coordinators. Page 2 of 5

3 Procedure for Requesting Data Access to Institute-wide Systems (as of February 2015) Authorized Requester Initiate request to create, change, or terminate access privileges. Three signatures required for new requests: User, Supervisor, Technical Certification (Define access requirements) Data User Requires access in the performance of job responsibilities. Appropriate Data Coordinator Cargill, Shalonda PeopleSoft HR GTDW Employee Data Hayes, Zach Banner Student GTDW* Student Data Gibson, Carol PeopleSoft Financial GTDW Financial Data Mason, Sandy PeopleSoft SPD PeopleSoft Grants GTDW* SPD Data GTDW* Grants Data Hutchison, Garry (Duane) Office of Sponsored Programs Bamburowski, David Graduate Admissions Cozzens, Susan Faculty Data (Non-HR Data) Yes Training required? No request includes: 1. Department 2. User Name 3. User ID 4. Job Title 5. Phone Number 6. What Data & Why 7. Access End Date 8. List of all intended user groups for requested data (incl. third parties). *GTDW=GT Data Warehouse Approve & forward notification Data Administrator Review requests Enable access Maintain authorization records Authorization Form User Packet Obtain Authorization Pick up copy Annotate & forward notification Data Coordinator Matches to request Authorized Requester Matches to request Data User Page 3 of 5

4 Chief Stewards, Data Stewards, and Primary Data Coordinators for Institute-wide Systems (as of February 2015) Reta Pikowsky, Registrar Zachary Hayes Associate Registrar Kim Harrington Associate Vice President - OHR Shalonda Cargill, Director HR Information Services Jim Fortner, Associate Vice President - Financial Svcs Carol Gibson, Associate Controller Banner Student Information Faculty Access System Data Warehouse Student Data General Student Information Student Major & Degree(s) Transfer Credits Student GT Grades Student Term Data (Hours & GPA) Course Instructors Current / Future Course Schedule(s) Student Activities PeopleSoft HR/Payroll Data Warehouse Employee Data HRMS Payroll PeopleSoft Financials PeopleSoft SPD Data Warehouse Financial Services Data Chart of Accounts Ledger Posting Detail Grants & Contracts Accounting Salary, Planning & Distribution Sandy Mason, Director - Grants & Contracts Accts. Jilda Garton, Associate Vice Provost - OSP Duane Hutchison, Director - OSP David Bamburowski, Director - Graduate Studies Susan Cozzens, Vice Provost Office of Sponsored Programs OSP System Graduate Admissions Data Faculty Data - Non HR Data Page 4 of 5

5 3. Revision History Revision Number Author Description Jimmy Lummis Updated Data Stewards and Coordinators Jimmy Lummis Updated Data Access Request diagram Herb Baines Updated Data Stewards diagram Richard Biever Updated Data Coordinator contact information Richard Biever Updated Data Coordinator contact information. Page 5 of 5

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,

More information

Information Security Operational Procedures

Information Security Operational Procedures College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by

More information

HR Function Access to Panels or Application Contact Information

HR Function Access to Panels or Application Contact Information GA Tech Administrative Systems: Training and Access Most often, training is required to request access to Georgia Tech s administrative systems. Use the charts to determine where systems are located on

More information

HR Inquiry and HR Ad-Hoc Report training will be combined and offered as a tutorial.

HR Inquiry and HR Ad-Hoc Report training will be combined and offered as a tutorial. Effective September 2013 HR Inquiry and HR Ad-Hoc Report training will be combined and offered as a tutorial. Use this training guide for overview information. The tutorial can be access from the OHR Training

More information

Rowan University Data Governance Policy

Rowan University Data Governance Policy Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Information Security Policy

Information Security Policy Information Security Policy Introduction The purpose of the is policy is to protect Rider University information resources from accidental or intentional unauthorized access, modification, or damage and

More information

Effort Certification Training. Regulatory Requirements

Effort Certification Training. Regulatory Requirements Effort Certification Training Regulatory Requirements What is Effort Reporting? Mechanism for Confirming Salary and Wage Charges to Sponsored Agreements - Confirms Salary Charged to Sponsored Agreements

More information

Assertion Control objectives Controls Tests of controls Occurrence and existence

Assertion Control objectives Controls Tests of controls Occurrence and existence Internal Control over Payroll Assertion Control objectives Controls Tests of controls Occurrence and existence Payment is made only to bona fide employees of the entity. Segregation of duties between HR

More information

Intro to Human Resources @ Georgia Tech. Training inquires: adminsystraining@gatech.edu

Intro to Human Resources @ Georgia Tech. Training inquires: adminsystraining@gatech.edu Intro to Human Resources @ Georgia Tech Training inquires: adminsystraining@gatech.edu Georgia Georgia Tech Tech Human Human Resources Resources Tutorial Objectives Overview of OHR and Internal Departments

More information

Contact: Henry Torres, (870) 972-3033

Contact: Henry Torres, (870) 972-3033 Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Boston College Office for Sponsored Programs BUSINESS PROCESS TRACKING MANDATORY COST SHARING IN PEOPLESOFT GRANTS

Boston College Office for Sponsored Programs BUSINESS PROCESS TRACKING MANDATORY COST SHARING IN PEOPLESOFT GRANTS Boston College Office for Sponsored Programs BUSINESS PROCESS TRACKING MANDATORY COST SHARING IN PEOPLESOFT GRANTS Table of Contents Business Process Description...3 Key Assumptions...3 Mandatory Cost

More information

IT Investment and Business Process Performance: Survey Questionnaire

IT Investment and Business Process Performance: Survey Questionnaire IT Investment and Business Process Performance: Survey Questionnaire Thank you for participating in the study being conducted by the EDUCAUSE Center for Applied Research (ECAR). This survey is a critical

More information

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Information Security Policy and Handbook Overview. ITSS Information Security June 2015 Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

BUSINESS CASE FOR GEORGIA TECH ENTERPRISE DATA MANAGEMENT

BUSINESS CASE FOR GEORGIA TECH ENTERPRISE DATA MANAGEMENT BUSINESS CASE FOR GEORGIA TECH ENTERPRISE DATA MANAGEMENT MV Page 1 PROJECT BUSINESS CASE Project Identification Project Name: Enterprise Data Management Date: _07/19/2012 Business Unit/Program Area: Decision

More information

When Completed: This procedure is performed whenever personnel actions are needed.

When Completed: This procedure is performed whenever personnel actions are needed. Effective Date: April 27, 2015 Revised Date: April 20, 2015 Prepared By: Stacie Bell Approved By: Mona Adkins-Easley Next Review Date: April 27, 2016 Title: Purpose: Scope: Personnel Action Form Procedure

More information

1. Prior to registering, access SalukiNet for information on registration eligibility. Register for classes using SalukiNet.

1. Prior to registering, access SalukiNet for information on registration eligibility. Register for classes using SalukiNet. Course registration process It is recommended that you register for courses as soon as possible, based on the registration schedule, and ideally no later than the end of the prior semester to the term

More information

Policy and Procedures Date: April 1, 2008

Policy and Procedures Date: April 1, 2008 Virginia Polytechnic Institute and State University No. 7100 Rev.: 4 Policy and Procedures Date: April 1, 2008 Subject: Administrative Data Management and Access Policy Contents 1. Premise and Purpose...

More information

CITY UNIVERSITY OF NEW YORK EMPLOYEE ACCESS TO THE STUDENT INFORMATION MANAGEMENT SYSTEM AT SELECTED CAMPUSES. Report 2007-S-23

CITY UNIVERSITY OF NEW YORK EMPLOYEE ACCESS TO THE STUDENT INFORMATION MANAGEMENT SYSTEM AT SELECTED CAMPUSES. Report 2007-S-23 Thomas P. DiNapoli COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE GOVERNMENT ACCOUNTABILITY Audit Objective... 2 Audit Results - Summary... 2 Background... 3 Audit Findings and

More information

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION

Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for

More information

UND School of Medicine & Health Sciences Principal Investigator Reference Guide

UND School of Medicine & Health Sciences Principal Investigator Reference Guide UND School of Medicine & Health Sciences Principal Investigator Reference Guide TABLE OF CONTENTS Table of Contents 2 Introduction 3 Responsibilities of the Principal Investigator 4 Signing Legal Grant

More information

Texas A&M University - Commerce: Review of Faculty Human Resources Processes PROJECT SUMMARY. Summary of Significant Results

Texas A&M University - Commerce: Review of Faculty Human Resources Processes PROJECT SUMMARY. Summary of Significant Results PROJECT SUMMARY Overview Table of Contents Project Summary... 1 Detailed Observations... 3 Basis of Review... 10 Audit Team Information... 11 Distribution List... 11 Processes and controls at Texas A&M

More information

St. John Fisher College Banner/ApplicationXtender Access Request Form

St. John Fisher College Banner/ApplicationXtender Access Request Form St. John Fisher College Banner/ApplicationXtender Access Request Form The Banner/ApplicationXtender Access Request Form consists of five pages, this instruction page and four pages for access request of

More information

Policy and Procedures Date: February 15, 2005

Policy and Procedures Date: February 15, 2005 Virginia Polytechnic Institute and State University No. 3105 Rev.: 1 Policy and Procedures Date: February 15, 2005 Subject: Effort Certification 1. Purpose...1 2. Policy...1 3. Procedures...2 3.1 General

More information

Virginia Commonwealth University Information Security Standard

Virginia Commonwealth University Information Security Standard Virginia Commonwealth University Information Security Standard Title: Scope: Data Classification Standard This document provides the classification requirements for all data generated, processed, stored,

More information

When to use this form

When to use this form MLT 4th Floor When to use this form This form should be used when making changes to an employee's current job details. The form is completed online and then routed electronically to the appropriate approvers.

More information

U.S. Nuclear Regulatory Commission

U.S. Nuclear Regulatory Commission ML111170543 U.S. Nuclear Regulatory Commission Privacy Impact Assessment (Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy Act, the

More information

New Student Orientation

New Student Orientation New Student Orientation Welcome to Ivy Tech Online - Ohio We are happy you have taken the next step toward enrolling at Ivy Tech Online Ohio, and we look forward to working with you as you begin your educational

More information

The Nuts and Bolts of Payroll

The Nuts and Bolts of Payroll The Nuts and Bolts of Payroll The Nuts and Bolts of Payroll Susan Smith Lead PIMS Analyst/Leave Accounting SME Intro Payroll Overview LAPP Making the Most of CMS Self Service Karen Batten Payroll Technical

More information

Department or unit: Job activities % of time New duty or change?

Department or unit: Job activities % of time New duty or change? HARVARD HUMAN RESOURCES Position Documentation and Questionnaire Form (PDF/PDQ) This form is being used for the purpose of: Job review/reclassification New position classification Instructions: Please

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Data Management Standard

Data Management Standard Data Management Standard Revision: Version 1.0 Date: 11/2015 Status: Approved by ISAC, Reviewed by Chancellor s Cabinet 1. Objectives Page 1 2. Scope Statement. Page 1 3. Requirements..Page 1 4. Definitions

More information

BERKELEY COLLEGE DATA SECURITY POLICY

BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data

More information

ARTICULATION AGREEMENT

ARTICULATION AGREEMENT ARTICULATION AGREEMENT FOR THE BACHELOR OF SCIENCE DEGREE INFORMATION SECURITY AND INTELLIGENCE BETWEEN FERRIS STATE UNIVERSITY AND DELTA COLLEGE THIS ARTICULATION AGREEMENT (hereinafter Agreement ) is

More information

Electronic System Access Request (ebar) Guide

Electronic System Access Request (ebar) Guide Electronic System Access Request (ebar) Guide The Electronic System Access Request (ebar) is the current way to request access for all Banner Systems: Banner Student Information (SIS), Student Accounts

More information

INDIANA UNIVERSITY EAST-EARLHAM COLLEGE COOPERATIVE AGREEMENT FOR THE BACHELORS DEGREE IN ELEMENTARY OR SECONDARY EDUCATION (Under Review)

INDIANA UNIVERSITY EAST-EARLHAM COLLEGE COOPERATIVE AGREEMENT FOR THE BACHELORS DEGREE IN ELEMENTARY OR SECONDARY EDUCATION (Under Review) INDIANA UNIVERSITY EAST-EARLHAM COLLEGE COOPERATIVE AGREEMENT FOR THE BACHELORS DEGREE IN ELEMENTARY OR SECONDARY EDUCATION (Under Review) ADMISSION TO TEACHER EDUCATION AT EITHER INSTITUTION: 1. Cumulative

More information

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

SUMMARY OF POSITION ROLE/RESPONSIBILITIES: SUMMARY OF POSITION ROLE/RESPONSIBILITIES: Reporting to the Senior Vice President for Administration, this position is responsible for ensuring that the University of Florida, in its entirety, is compliant

More information

Office of Human Resources Department of Compensation & Performance Management epar Smart Sheets & Business Rules

Office of Human Resources Department of Compensation & Performance Management epar Smart Sheets & Business Rules Office of Human Resources Department of Compensation & Performance Management epar Smart Sheets & Business Rules 7/1/2013 epar Smart Sheets & Business Rules 1 Creating a New Position (Offline Process)

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

HR Web Changes Resulting from Project Compass Effective September 1, 2009

HR Web Changes Resulting from Project Compass Effective September 1, 2009 EMORY HR WEB HR Web Changes Resulting from Project Compass Effective September 1, 2009 HR Web and PeopleSoft Financials 9.0 With the introduction of a new enterprise-wide financial accounting system, PeopleSoft

More information

HAVERFORD COLLEGE IITS: POLICY AND PLANNING

HAVERFORD COLLEGE IITS: POLICY AND PLANNING Contents: 1. Preface 2. Policy 3. Audit and Compliance Section 1. Preface A. Name. The formal name of this policy is the Policy. B. Status of This Policy 1. Draft. Completed 4/11/2013 2. Public Review

More information

2. Scope This policy addresses all web sites hosted by the central web hosting service.

2. Scope This policy addresses all web sites hosted by the central web hosting service. OIT Web Hosting Policy Rev. 4.04 Effective Date: Last Revised: January 3, 2011 January 3, 2011 The following are responsible for the accuracy of the information contained in this document Responsible University

More information

Independent Contractor Policy

Independent Contractor Policy Independent Contractor Policy Policy Contents Policy Statement Reason for Policy Who Should Read this Policy Policy Text Procedures Related Information Definitions Additional Contacts Forms Responsibilities

More information

The UMC Web Engine - Model For Success

The UMC Web Engine - Model For Success UNIVERSITY OF MISSISSIPPI MEDICAL CENTER for the UMC Web Environment Page 1 of 12 1.0 PURPOSE The purpose of the is to establish requirements and provide instructions as governed by the Information Policy.

More information

Professional Position Description Section I Position Information Position Title

Professional Position Description Section I Position Information Position Title Professional Position Description Section I Position Information Update Only Classification Review Position Title Coordinator, Payroll Position # 999706 Department Human Resources Classification Level

More information

ASU Payroll Audit Number 07-01 April 2007

ASU Payroll Audit Number 07-01 April 2007 Audit Number 07-01 April 2007 University Audit and Advisory Services EXECUTIVE SUMMARY Scope and Objective During fiscal year ended June 30, 2006, Arizona State University (ASU) paid over 6,500 employees

More information

Georgia Tech Active Directory Policy

Georgia Tech Active Directory Policy Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review

More information

Ohio Wesleyan University Search/Recruitment Procedures

Ohio Wesleyan University Search/Recruitment Procedures Position Title: Search Number: #1314 - Search Start Date: ****************************************************************************** The latest version of the search/recruitment paperwork is attached

More information

Actionable Intelligence: Big Data for Student Success. Brian A. Haugabrook, Valdosta State University Barrie D. Fitzgerald, Valdosta State University

Actionable Intelligence: Big Data for Student Success. Brian A. Haugabrook, Valdosta State University Barrie D. Fitzgerald, Valdosta State University Actionable Intelligence: Big Data for Student Success Brian A. Haugabrook, Valdosta State University Barrie D. Fitzgerald, Valdosta State University Strategic Goals 1. Strategic business intelligence for

More information

HOWARD UNIVERSITY POLICY

HOWARD UNIVERSITY POLICY HOWARD UNIVERSITY POLICY Policy Number: 300-001 Policy Title: ACCOUNTS PAYABLE: PAYMENTS TO VENDORS Responsible Officer: Chief Financial Officer Responsible Office: Office of the Chief Financial Officer

More information

1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role

1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role 1. Introduction 2. New Responsibilities 3. Transactional Processes 4. Use of PeopleSoft User Role Definition of Responsibilities 1. Department Manager-Responsible official appointed by the Dean or Department

More information

Records Management Manual of the University of Nevada Las Vegas Table of Contents

Records Management Manual of the University of Nevada Las Vegas Table of Contents Records Management Manual of the University of Nevada Las Vegas Table of Contents Part 1: Overview of Records Management at the University of Nevada Las Vegas... 2 1.1 PROGRAM RATIONALE, RESPONSIBILITIES

More information

APPENDIX 1. CLASSIFIED EMPLOYEE COMPENSATION MARKET STUDY JOB EVALUATION METHODOLOGY REVIEW And COMPENSATION REPORTING STRUCTURE DESIGN

APPENDIX 1. CLASSIFIED EMPLOYEE COMPENSATION MARKET STUDY JOB EVALUATION METHODOLOGY REVIEW And COMPENSATION REPORTING STRUCTURE DESIGN APPENDIX 1 CLASSIFIED EMPLOYEE COMPENSATION MARKET STUDY JOB EVALUATION METHODOLOGY REVIEW And COMPENSATION REPORTING STRUCTURE DESIGN REQUEST FOR PROPOSALS (RFP) NO. 15191 April 15, 2015 Project Background

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

LANGSTON UNIVERSITY STUDENT QUICK GUIDE FROM THE REGISTRAR S OFFICE

LANGSTON UNIVERSITY STUDENT QUICK GUIDE FROM THE REGISTRAR S OFFICE LANGSTON UNIVERSITY STUDENT QUICK GUIDE FROM THE REGISTRAR S OFFICE PRESENTED BY KATHY SIMMONS, UNIVERSITY REGISTAR FALL 2013 FERPA Langston University makes every effort to comply with the Family Educational

More information

Graduate-Level, Academic Credit Certificate Programs

Graduate-Level, Academic Credit Certificate Programs Graduate-Level, Academic Credit Certificate Programs From the Policies and Procedures for Administering Graduate Student Programs manual: All Graduate Certificate Programs must be approved by the Graduate

More information

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY

Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140

More information

This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance:

This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: This document will describe Lake Superior State University s adherence to the following Commission policies regarding federal compliance: Credits, program length, and tuition Student complaints Transfer

More information

Institutional Data Governance Policy

Institutional Data Governance Policy Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.

More information

Information Security Operational Procedures Banner Student Information System Security Policy

Information Security Operational Procedures Banner Student Information System Security Policy Policy No: 803 Area: Information Technology Services Adopted: 8/6/2012 Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides

More information

Salary and Planning Distribution (SPD) Ad-Hoc Reporting Tool

Salary and Planning Distribution (SPD) Ad-Hoc Reporting Tool Salary and Planning Distribution (SPD) Ad-Hoc Reporting Tool Georgia Institute of Technology HRMS 8.8 Systems Training Copyright Georgia Institute of Technology 2004 Table of Contents Getting Started...3

More information

Teachers - Alternative Certification Program Information and Checklist

Teachers - Alternative Certification Program Information and Checklist Part B Teachers - Alternative Certification Program Information and Checklist ACP Information & Checklist Salary Schedule Teacher and Nurses Recruitment Referral Form ACP Instructions Staff Development

More information

Position Reports To: Associate Dean, Budget & Operations

Position Reports To: Associate Dean, Budget & Operations POSITION DESCRIPTION Department: CHABSS (Arts) Position Reports To: Associate Dean, Budget & Operations Working Title: Administrative Support Assistant Classification: Administrative Support Assistant

More information

Online Tuition Concession Faculty and Staff. July 2015 Human Resources Wake Forest University

Online Tuition Concession Faculty and Staff. July 2015 Human Resources Wake Forest University Online Tuition Concession Faculty and Staff July 2015 Human Resources Wake Forest University 1 Table of Contents Accessing the Tuition Concession Form 3 Submitting a Request 4 Tracking a Request 14 Contact

More information

HUMAN RESOURCES MANAGEMENT SYSTEM. PeopleSoft Version 8.9 epar

HUMAN RESOURCES MANAGEMENT SYSTEM. PeopleSoft Version 8.9 epar HUMAN RESOURCES MANAGEMENT SYSTEM PeopleSoft Version 8.9 epar University of Houston System Training/ Reference Guide Human Resource Information Management Mandi Oliver 713-743-0903 TABLE OF CONTENTS Chapter

More information

Information Security

Information Security Information Security Table of Contents Statement of Confidentiality and Responsibility... 2 Policy and Regulation... 2 Protect Our Information... 3 Protect Your Account... 4 To Change Your Password...

More information

HOSTING INTERNATIONAL EXCHANGE VISITORS

HOSTING INTERNATIONAL EXCHANGE VISITORS I. GENERAL POLICY HOSTING INTERNATIONAL EXCHANGE VISITORS 1. WWU sponsors J-1 visas for international faculty, scholars, artists, and graduate students, whether salaried or non-salaried, who engage in

More information

7/11/2012 ILLINOIS INSTITUTE OF TECHNOLOGY (IIT) STUDENT IPAD INITIATIVE

7/11/2012 ILLINOIS INSTITUTE OF TECHNOLOGY (IIT) STUDENT IPAD INITIATIVE Leveraging Business Intelligence and ipad Applications for Financial Reporting Brian Laffey, AVP Finance and Controller Illinois i Institute t of Technology 1 Agenda University s ipad Initiative Financial

More information

Staffing and Classification Procedures

Staffing and Classification Procedures Staffing and Classification Procedures Preface These procedures apply to staff employed by the University of Southern California. In the event of a discrepancy between procedures, guidelines and a collective

More information

TUITION ASSISTANCE PLAN & TUITION REIMBURSEMENT PLAN. Harvard University

TUITION ASSISTANCE PLAN & TUITION REIMBURSEMENT PLAN. Harvard University TUITION ASSISTANCE PLAN & TUITION REIMBURSEMENT PLAN Harvard University C O N T E N T S Tuition Assistance Plan (TAP).. 2 What is the Tuition Assistance Plan? Tuition Reimbursement Plan (TRP)... 2 What

More information

UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07

UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM. SECTION: Information Services NUMBER: 07.A.07 UNIVERSITY OF HOUSTON SYSTEM ADMINISTRATIVE MEMORANDUM SECTION: Information Services NUMBER: 07.A.07 AREA: Computing Services SUBJECT: Use of Electronic Messaging Services by Employees 1. PURPOSE The purpose

More information

Achieving HIPAA Compliance with Identity and Access Management

Achieving HIPAA Compliance with Identity and Access Management Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views

More information

University of San Diego University Audit Office Self-Audit Tool. A - General

University of San Diego University Audit Office Self-Audit Tool. A - General University of San Diego University Audit Office Self-Audit Tool Department: Budget Officer: Completed by: Date: The Self-Audit Tool is a guide and is not all-inclusive. Yes indicates a needed control is

More information

Information Security Plan May 24, 2011

Information Security Plan May 24, 2011 Information Security Plan May 24, 2011 REVISION CONTROL Document Title: Author: HSU Information Security Plan John McBrearty Revision History Revision Date Revised By Summary of Revisions Sections Revised

More information

Human ResourcesHuman Resources - Project Overview

Human ResourcesHuman Resources - Project Overview PROJECT SUMMARY Overview Table of Contents Project Summary... 1 Detailed Observations... 3 Basis of Review... 8 Audit Team Information... 9 Distribution List... 9 Overall, Texas A&M International University

More information

The Applicant Tracking System Tool for Supporting the Requisition Lifecycle

The Applicant Tracking System Tool for Supporting the Requisition Lifecycle The Applicant Tracking System Tool for Supporting the Requisition Lifecycle Process Guide Contact Information: For questions or additional information, send an email to ats@gatech.edu What s Included in

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes

More information

Developing a Data Governance System

Developing a Data Governance System UNIVERSITY BUSINESS EXECUTIVE ROUNDTABLE Developing a Data Governance System Custom Research Brief October 22, 2010 RESEARCH ASSOCIATE Jeff Durkin TABLE OF CONTENTS I. Research Methodology II. Executive

More information

COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES

COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES COOPERATIVE EDUCATION AND INTERNSHIP GUIDELINES Career and Technical Education Division Career and Technical Education Initiatives We Make Houston Work Houston Community College Last Revised 05/01/13 Dr.

More information

GEORGIA STATE UNIVERSITY BYRDINE F. LEWIS SCHOOL OF NURSING and HEALTH PROFESSIONS

GEORGIA STATE UNIVERSITY BYRDINE F. LEWIS SCHOOL OF NURSING and HEALTH PROFESSIONS 1 GEORGIA STATE UNIVERSITY BYRDINE F. LEWIS SCHOOL OF NURSING and HEALTH PROFESSIONS SELF-MANAGED APPLICATION INSTRUCTIONS Please Note The preferred method is to submit an application online at http://nursing.gsu.edu/academics/admissions/undergraduate/application-and-requirements/.

More information

Criminal Justice Internship Program CJ 4488, CJ 4489, & CJ 4490

Criminal Justice Internship Program CJ 4488, CJ 4489, & CJ 4490 Criminal Justice Internship Program CJ 4488, CJ 4489, & CJ 4490 This policy governs the Internship Program for students majoring in Criminal Justice at Troy University. Participation in the Internship

More information

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor

Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense

More information

Guidelines for Submitting Job Reviews AUPE and MaPS

Guidelines for Submitting Job Reviews AUPE and MaPS Guidelines for Submitting Job Reviews AUPE and MaPS Total Rewards April 2015 2 TABLE OF CONTENTS Human Resources Website I. Introduction... 3 II. Purpose of a Job Review... 3 III. Job Review Process...

More information

HIGH SCHOOL TRANSCRIPT

HIGH SCHOOL TRANSCRIPT SCCCD Clovis Community College Center The procedures for applying to the are listed below: 1. The intent of this program is to provide college enrichment opportunities for a limited number of eligible

More information

Faculty Achievement Award in Research (FAAR) Authorization Form FY10

Faculty Achievement Award in Research (FAAR) Authorization Form FY10 School of Medicine Campus End User Instructions -Associate Dean for Research and Faculty Affairs FORM Faculty Achievement Award in Research (FAAR) Authorization Use: To provide information regarding the

More information

University of Hawai i Executive Policy on Data Governance (Draft 2/1/12)

University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) I. Definition Data governance is the exercise of authority and control (planning, monitoring, and enforcement) over the management

More information

2 Soi Kalong 2, Nonthaburi Rd., Tasai, Muangnonthaburi, Nonthaburi 11000 P: 0-2580-8060 F: 0-2580-6878 WWW.CSC.CO.TH

2 Soi Kalong 2, Nonthaburi Rd., Tasai, Muangnonthaburi, Nonthaburi 11000 P: 0-2580-8060 F: 0-2580-6878 WWW.CSC.CO.TH myhr Feature WWW.CSC.CO.TH Contents Page Title Introduction... 1 SMART E-Profile... 1 Payroll... 5 Recruitment... 6 Appraisal... 8 Training... 9 Time Attendance... 11 Workflow... 13 myhr Network Diagram...

More information

1. Project Charter. Sheri Kellogg. Phyllis Short. Project Title: PeopleSoft CSS / HCM Split Description:

1. Project Charter. Sheri Kellogg. Phyllis Short. Project Title: PeopleSoft CSS / HCM Split Description: 1. Stakeholder Name Cecilia Castellano Chris Cox Laura Emch Andy Grant Sheri Kellogg Chastity McCartney Beth Ann Rife Phyllis Short Michelle Simmons Brian Skelding Sharon Swartz Department Admissions Registrar

More information

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE:

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE: Policy No: TITLE: AP-AA-17.2 Data Classification and Data Security ADMINISTERED BY: Office of Vice President for Academic Affairs PURPOSE EFFECTIVE DATE: CANCELLATION: REVIEW DATE: August 8, 2005 Fall

More information

Rowan University IT ACQUISITION POLICY

Rowan University IT ACQUISITION POLICY Rowan University IT ACQUISITION POLICY Effective: January 2014 Data Governance: IT Acquisition Policy Page 1 of 6 IT ACQUISITION POLICY Title: Data Governance: IT Acquisition Policy Subject: Information

More information

Welcome to Ivy Tech Online McDonald s Employee Management Program

Welcome to Ivy Tech Online McDonald s Employee Management Program Welcome to Ivy Tech Online McDonald s Employee Management Program We are happy you have taken the next step toward enrolling at Ivy Tech Online McDonald s Employee Management Program, and we look forward

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information