IT Project Co-Sponsor: John Scoville Project Dependencies:
|
|
- Chastity Newton
- 8 years ago
- Views:
Transcription
1 March 1, 2005 Student System Consolidation - Phase I Executive Sponsor: Chancellor Davis Project Manager: Jeff Noyes Project Coordinator: Margaret Dillard Project Sponsor: Vice Chancellor Tom Maier, AVC Tonya Lam IT Project Co-Sponsor: John Graham IT Project Co-Sponsor: John Scoville Project Dependencies: < Include any dependencies surrounding this project including other projects or implementations. > PeachNet GaBEST Model Banner V6 and V7 TouchNet PeopleSoft Financials Interfaces HRMS and Academic Datamarts (USG123) WebCT/VISTA Deployment USOA Legacy Reporting Requirements GALILEO Interface with approved 3 rd party Campus Systems (e.g. parking, bookstore, one card, etc.) Luminis Academic Policy GAcollege411 XML Transferable Transcript Prerequisite for Multi-Institutional Functionality (MIF) Implementation Linkages to the IIT Strategic Plan: < Include the linkages to the IIT Strategic Plan Learning Without Limits > Goal 5.2 in the USG IIT Strategic Plan specifically states Develop objective criteria for decision-making and for determining the most advantageous methods for supplying services and support for the USG.
2 Goals & Objectives: < Include no more than three succinct goals for the project. These statements should be worded so they are easy to remember and adequately reflect the desired outcomes for the project. The objective statement should include possible phases of the project (if applicable), the expected timeframe, and budget information. > Recognizing the need to provide reliable and efficient student services across the University System of Georgia (USG), the Student System Consolidation (SSC) project seeks to consolidate the technical environment for the USG Banner Student Information System into one central location that will serve the six institutions participating in the project: Bainbridge College, Waycross College, South Georgia College, Atlanta Metropolitan College, Fort Valley State University, and Georgia Gwinnett College. Through consolidation, we will improve services across USG with a model implementation of the Banner Student Information System software that will include only the software as released by the vendor and approved GaBEST modifications. The model system will be a supportable, sustainable solution that will result in long-range cost avoidance. With this in mind, the SSC project has identified two major objectives: 1. Establish a consolidated technical environment for the USG Banner Student Information System that integrates well with other enterprise applications. 2. Provide an enhanced level of consistent student services throughout the USG. Background/Narrative: < Provide any pertinent background information and/or drivers of the project. Answer questions such as: Why is this project needed? What has brought about the need for this project? What are the surrounding issues? What functions will be affected? What has been the impact of not having this project implemented? > Although thirty-two USG institutions are operating the same basic Banner Student Information System software, each is providing its own computer equipment, technical staff, and facilities at each local campus. These institutions include large research and regional universities as well as smaller four-year and two-year colleges which have limited resources to support this type of effort. These multiple installations are largely duplicative in computer equipment and senior technical staff. In addition, the separate installations, each with their own support staff, invite separate approaches to service delivery, reporting, data collection, and even data definitions. This highly decentralized operation of the Banner Student Information System is inherently inefficient and costly and often results in inconsistent levels of services to USG students at different institutions as well as difficulties in consistent reporting. The purpose of the SSC project is to establish a single, central computer equipment operation that will provide a common software system to be used by all the participating institutions, resulting in a more efficient, consistent, and feature-rich student information system for USG.
3 Boundaries: < Empowerment limits and project constraints. Answer the questions what is in scope and what is out of scope of the project. > Overall Boundaries The initial planning process for this project is based on the following overall boundaries: 1. In order to improve supportability and ensure a consistent level of student services, the same production version and patch level of Banner and Georgia Enhancements are required of participating institutions. 2. In a consolidated environment, as in the existing campus Banner environments, reliability and consistency can best be ensured when the Banner Baseline product and/or existing Georgia Best model software enhancements are used for common academic business practices. 3. In a consolidated environment, as in the existing campus Banner environments, when legacy business procedures limit the appropriate use of the Banner Baseline product or existing Georgia Best model software enhancements, institutions should always explore the common academic business practices that allow implementation through the Banner Baseline product and/or existing Georgia Best model software enhancements. 4. There may be cases in which accepted academic business practices can not be implemented through the Banner Baseline product and/or existing Georgia Best model software enhancements. A model change review process, governed by the Associate Vice Chancellor for Student Affairs, in conjunction with user groups that are representative of the USG campus community, will be available. This change review process group will be responsible for the acceptance, review, and approval of changes to the model software. 5. When the process in Overall Boundary #4 is used to determine that modifications are appropriate to best benefit all USG institutions, these modification will be incorporated into the consolidated model. Specific Boundaries The SSC project sponsorship has established the following specific boundaries based on knowledge gained from the PeopleSoft environments, an awareness of the different needs of the Banner environment, and the future direction of the development of the SunGardHE Banner application. 1. The following SunGardHE products are not planned or budgeted for in the initial implementation phases of this project: o IVR Voice Response o Luminis Platform Suite (including Portal, content management, calendaring, and SSO) o SUNGARDHE Imaging, Workflow, and other document management applications Note: While the SSC project sponsorship recognizes the importance of these products and services, extensive additional analysis is necessary to determine the best way for the SSC environment to accommodate them. 2. The Multi-Institutional Functionality (MIF) project capabilities are being integrated into baseline Banner. SSC institutions will have this capability with the implementation of the appropriate Banner version upgrade 3. Experienced campus personnel are, and will remain, the best avenue to provide primary functional user support. The OIIT Customer Service HelpDesk may be contacted for secondary support as necessary. Escalation of issues with SunGardHE through OIIT has been extended to include 24x7 support. 4. The SSC project will establish uptime availability for the hosted environment as follows: o OIIT will perform regular backups and other scheduled maintenance that will require SSC service downtime according to the OIIT Service Level Guidelines, a published maintenance schedule and process.
4 o If the repetitive testing of any upgrade process proves the tasks associated with an upgrade cannot be completed during the regular maintenance window or over a weekend, extended downtime will be scheduled with prior notice. o A comprehensive backup plan for maximum recoverability will be developed and tested and will use enterprise-class storage solutions and a combination of backup solutions. o A retention cycle for backup sets of at least a 7 day, 4 week, and 4 month cycle will be maintained. Additional backup retention periods may be necessary to address needs during agreed upon academic processing cycles that coincide with the published System Office academic processing cycles. 5. In order to create an efficient and reliable environment, the SSC project will establish the characteristics of the hosted environment as follows: o The Banner database and application servers for the SSC environment will be housed in a hardened facility in Athens. o In order to establish a common quality assurance process, the SSC environment will provide each participating campus with one pre-production environment that may be used for campus testing purposes. Read-only access outside of the Banner application will be provided in this pre-production environment to facilitate reporting. No development or update access outside of the Banner application will be provided to end users of the pre-production environment. User privileges and accesses will be established in this environment as a mimic of production privileges and accesses to ensure the integrity of testing of upgrades, patches, and releases prior to application to production. o The SSC environment will provide each participating campus with one production environment. Read-only access outside of the Banner application will be provided in the production environment to facilitate reporting and execution of read-only interfaces. To protect campus data, no development or update access outside of the Banner application will be provided to end users of the production environment. o The SSC project sponsorship will establish a common process for data updates outside the Banner application with data recovery points. o Campuses will retain the ability and responsibility to customize their Banner Self Service pages through the use of Web Tailor. o The SSC environment will use firewall protection and encryption where appropriate. o The SSC environment for production will be implemented at the most recently released version of the Banner and the Georgia Enhancements. o SunGardHE will discontinue the support of the Banner client/server during the implementation phase(s) of the SSC project. Therefore, in order to provide for the smoothest transition for administrative users, Internet Native Banner (INB) will be used in the SSC environment to provide administrative access to Banner. Traditional Banner GUI (client/server) access will not be provided to administrative users in the SSC environment. o In order to provide the most secure and accountable environment, UNIX shell accounts or telnet/ssh will not be supported in the SSC environment. Mechanisms will be provided to enable users to securely upload tape load files for batch processing and to review the status of jobs that have been submitted through Banner job submission. o A job scheduler will be provided to allow campus-designated technical personnel to schedule and maintain end user jobs for their campus without having an adverse impact on the shared resource. UNIX scheduling through cron or at jobs will not be supported. o The SSC environment will establish a database naming convention that is similar to the PeopleSoft naming
5 convention so as to easily identify the institution and to distinguish between production and non-production environments. o The SSC environment will use default Banner seed numbers. This will eliminate the need to reset seed numbers in multiple areas within the SSC environment for each upgrade. o With the exception of Banner Self Service, the SSC environment will allow access to Banner for administrative users only from the IP address space of PeachNet. Banner Self Service will be accessible in SSL-enabled mode from a supported browser on the WAN. o The SSC environment will provide browser-based delivery for Banner output. o Reporting and read-only database access in the SSC environment will require the ability to initiate an encrypted client session. 6. To ensure the security of the environment, the SSC project will establish user access to the hosted environment as follows: o Because the current architecture of the Banner environment allows creation of DBA level accounts from the Banner Security objects, the central support group will initially create the new Banner user accounts in the proposed SSC environment databases. This will only involve the creation of the initial accounts to establish the account using rules suggested by the State Department of Audits and the Administrative Committee for Information Technology (ACIT). Campus personnel will retain the ability and responsibility to define user classes and access levels and enter the information into administrative Banner. o Database password strength for new accounts will be set and enforced using password strength algorithms. o The SSC environment will not include the ability for campus personnel to create direct database access accounts. o The SSC environment will not provide Oracle login access to Banner schema owner accounts (i.e. general, arsys, faismgr, taismgr, baninst1, WebTailor, etc.) to campus personnel. o The SSC environment will not enable campus personnel to create customized database objects (tables, PL/SQL objects, etc.). o The SSC environment will not enable campus personnel to modify existing Banner Baseline or Georgia Best model enhanced database objects except as participants of a governed change management and joint development process as defined in Overall Boundary # The SSC project will establish supported solutions for data updates outside of the Banner Baseline application forms and/or processes as follows: o The SSC environment will not provide the campus community at large with direct access to update Banner data outside of the administrative Banner application or Banner Self Service. o The SSC environment will provide the ability to transfer files to the individual participating institution s hosted environment to support tape load processes that are a part of the Banner Baseline product and/or existing Georgia Best model software enhancements. o In the SSC environment, batch updates, including update interfaces, to Banner outside of the administrative Banner application or Banner Self Service, will be treated as data base interventions (DBIs). Campus personnel will develop DBIs that follow a change migration cycle of application to-test-environment by the central support group, testing, approval, and written sign-off by campus authority; and application to a production environment by the central support group following a backup cycle, during which a verified recovery point will be taken. 8. The SSC project will establish supported solutions for end user reporting and outbound interfaces as defined below:
6 o The SSC environment will provide a reporting environment to allow flexibility in reporting options at the institutional level for the participating campuses. o The SSC environment will create at least one reporting role and user account for each campus database to support ad hoc reporting and read-only interfaces from all the Banner schemas outside of the Banner application-provided reports. If a set of job-specific or schema-specific roles for reporting outside of the Banner application need to be defined, the SSC project members will rely upon the governing user group(s) to define and document the access associated with the various reporting roles. o Data extracts from Banner in the SSC environment to 3 rd party systems (such as parking or ID card systems) will be handled as read-only interfaces. The reporting role(s) and account provided by the SSC environment will be used to execute data extracts from Banner. o Read-only database access in the SSC environment will require the ability to initiate an encrypted client session. 9. The SSC project will establish beta testing, user acceptance testing periods, and methods as follows: o The SSC environment will provide a read-only, pre-production environment for each participating institution that will be established with the same privileges and accesses as the production environment. The preproduction environment will be used by participating campuses for testing Banner or Georgia Best model software processes and procedures prior to execution in production. o The SSC project will schedule upgrades during specified upgrade windows for a period of time based on the complexity, timing, and relative content of the specific upgrade. o The SSC project will support and observe one common quality assurance process for testing and certification for Banner and Georgia Best model software enhancements in cooperation with the common development environment as defined in Specific Boundary #8. o The SSC project will establish supported solutions for development of non read-only modification as follows: - The SSC project will provide one common development environment that can be shared by all institutions that participate in joint development of approved modification for the project while not interfering with reporting efforts. - The SSC project sponsorship will provide a process to develop, test, certify, and deploy common services. Therefore, the SSC project will support on change management process that will be governed by the process defined in Overall Boundary #4. - The SSC project will support one common joint development agenda as defined by the governed change review process referred to Overall Boundary #4. - The SSC project will provide all participating campuses with access to the common development environment. The SSC project will not provide individual development environments to campuses.
7 Deliverables: < Tangible and intangible products, processes, results and services > 1. Centrally managed disaster recovery and technical business continuity plan for hosted applications. 2. Technical framework to support standardization of business practices. 3. Central management of certain security tasks for hosted application tests following ACIT and OIIT security guidelines including change control procedures for application source code, security awareness training, application of vendor security patches and conducting periodic security penetration tests x 7 hardware support with 4 hour vendor response time for hardware maintenance. 5. SSL encryption for Banner Self-Service (Banner Web) 6. Uniform backup strategy for hosted application, including an automated tape management and tape retirement strategy. 7. Enterprise job scheduling for administrative users using a job scheduler. 8. Service availability monitoring for the hosted application. 9. A service level guideline. 10. Remotely accessed campus reporting environment. 11. Remotely accessed joint developer environment.
GeorgiaBEST Banner 8 Institutional Web Conference. March 30, 2009
Institutional Web Conference March 30, 2009 AGENDA V8 Implementation Schedule Changes in functionality Technical Update General Discussion OIIT Deployment Schedule Campus Implementation Schedule TEST by
More informationModule 7: System Component Failure Contingencies
Module 7: System Component Failure Contingencies Introduction The purpose of this module is to describe procedures and standards for recovery plans to be implemented in the event of system component failures.
More informationAttachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
More informationSingle Sign On for TouchNet Products Workbook. Information Technology Services
Single Sign On for TouchNet Products Workbook November 2010 This page left blank to facilitate front/back printing. Table of Contents Table of Contents Single Sign On Functionality for TouchNet Products...
More informationGeorgia Tech s Luminis IV Beta Testing
SUNGARD SUMMIT 2007 sungardsummit.com 1 Georgia Tech s Luminis IV Beta Testing Presented by: Steve Goeke Georgia Tech March 22, 2007 A Community of Learning Agenda Portal Environment and Architecture To
More informationSECTION: SUBJECT: PCI-DSS General Guidelines and Procedures
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
More informationOracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
More informationOWG 60 IT Backend Systems Approved Recommendations
OWG 60 IT Backend Systems Approved Recommendations 1. Recommends working with OWG 62 on developing a comprehensive inventory tracking process for the new institution inventory and record all assets purchased
More informationState of Wisconsin Database Hosting Services Roles and Responsibilities
State of Wisconsin Hosting Services oles and esponsibilities Document evision History (Major Post Publishing evisions Only) Date Version reator Notes 12/9/2010 1.0 This document describes the Hosting Services
More informationManaging and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationFIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
More informationGuide Parchment to Implementation and User Automation: Guide PeopleSoft
Guide Parchment to Implementation Send K-12 and User Automation: Guide PeopleSoft 2 Contents OVERVIEW 3 PRODUCT OVERVIEW 4 Access 4 Transcript Ordering 4 Request Processing 4 Transcript Request Fulfillment
More informationSystem Requirement Specifications (SRS)
(SRS) Assignment 1 Sample Solution 1 Table of Contents 1 Table of Contents... 1 2 Problem Statement... 2 3 Overview... 2 3.1 Background... 2 3.2 Overall Description... 2 4 Investigation & Analysis Methodology...
More informationOracle Fixed Scope Services Definitions Effective Date: October 14, 2011
Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011 "You" and "your" refers to the individual or entity that has ordered Advanced Customer Services from Oracle or an authorized distributor.
More informationDivision of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
More informationGE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
More information6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
More informationGeorgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationUser Interface Modernization Banner Self-Service
User Interface Modernization Banner Self-Service User Interface Modernization: Goals User-centric design approach It s about the user - not the technology! Improve usability through consistent, effective
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
More informationPierianDx - Clinical Genomicist Workstation Software as a Service FAQ s
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
More informationD50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
More informationInformation Security Operational Procedures
College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by
More informationBanner DBA Survival Guide
SUNGARD SUMMIT 2007 sungardsummit.com 1 Banner DBA Survival Guide Presented by: Kathleen O Donnell, Pacific Lutheran University March 20, 2007 Course ID: 029 A Community of Learning Introduction Purpose
More informationInForm On Demand Single Trial Services Description
InForm On Demand Single Trial Services Description Version 7.0 Effective Date: 0 25-Sep-2014 This is the Services Description for Oracle InForm On Demand Single Trial ( Schedule ) to Your Study Order for
More informationNetwork Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
More informationChange Management Procedures Re: The Peoplesoft Application at Mona
Change Management Procedures Re: The Peoplesoft Application at Mona (The original Peoplesoft document was modified to relate more closely to UWI Mona) See also.. MITS Project Management Methodology & MITS
More informationInformation System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
More informationEllucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant
Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed
More informationRL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
More informationUbertas Cloud Services: Service Definition
Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationSPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX
SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),
More informationInnovation through Outsourcing
Innovation through Outsourcing Timothy Gehrig timothy.gehrig@cedarcrestone.com David Moore david.moore@cedarcrestone.com Agenda Expectations CedarCrestone Introduction Market Direction Outsourcing Solutions
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
More informationInformation security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
More information<Insert Picture Here> Best Practices from Oracle Managed Services for Maintenance and Support of Oracle Solutions
Best Practices from Oracle Managed Services for Maintenance and Support of Oracle Solutions dr.ir. Wouter Schmidt Solution Architect Sigrun Bichlmeier Business Development Manager
More informationInformation Technology Plan 2010 2011
Information Technology Plan 2010 2011 September 2010 The FY10-11 IT plan was developed through collaboration with IT staff and engagement with IT governance groups. In the budget-constrained environment,
More informationUnited States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment
United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
More informationPlease Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
More informationDATABASE ANALYST I DATABASE ANALYST II
CITY OF ROSEVILLE DATABASE ANALYST I DATABASE ANALYST II DEFINITION To perform professional level work in designing, installing, managing, updating, and securing a variety of database systems, including
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationGMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationCopyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
More informationVMware Cloud Automation Design and Deploy IaaS Service
DATASHEET VMware Cloud Automation AT A GLANCE The VMware Cloud Automation Design and Deploy IaaS Service expands the power of virtualization and moves IT services away from existing infrastructure delivery
More informationInformation Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationService Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support
Service Support 1.1. First Level Support First Level Support (Tier I) provides immediate response to emergencies and customer questions TSD - First Level Support Office: Sub-Division: Extension: E-mail:
More informationBanner overview. Authentication to Banner & 3 rd Party Apps. Authorization to Banner & 3 rd Party Apps
Banner overview Authentication to Banner & 3 rd Party Apps Authorization to Banner & 3 rd Party Apps 1 Section 1 Higher Education Enterprise Resource Planning (ERP) system. Original vendor SunGard Higher
More informationOracle Database 11g: New Features for Administrators DBA Release 2
Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change
More informationTime to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationQuestion Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
More informationInformation Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
More informationProject Charter and Scope Statement
Prepared by: Mike Schmidt Version: 1.0 Last Revision Date: April 14, 2010 Create Date: May 6, 2010 EXECUTIVE SUMMARY... 3 1 INTRODUCTION... 4 2 PROJECT OBJECTIVES... 4 2.1 MISSION... 4 2.2 OBJECTIVES...
More information6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)
www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server
More informationIBM AIX MANAGED SERVICES:
IBM AIX MANAGED SERVICES: REMOTE MONITORING REMOTE ADMINISTRATION MANAGED HOSTING Reduce Your IBM AIX (pseries) Operating Costs & Get Higher Uptime. Let Connectria Help Run Your IBM AIX (pseries) Environment.
More informationSysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery
More informationINSTALLATION AND CONVERSION PLAN
INSTALLATION AND CONVERSION PLAN Integrated Procurement System (Case Study) U.S. Election Commission INSTALLATION AND CONVERSION PLAN TABLE OF CONTENTS Page # 1.0 INSTALLATION OVERVIEW...1 2.0 SECURITY
More informationThe Project Management Plan will be used to guide, communicate and coordinate project efforts.
F.1 General Implementation Contractor Deliverables include critical system planning and development components. Sufficient deliverables have been identified at key steps in the project to guide the project
More informationexchange.parchment.com
Automation Parchment Send Implementation K-12 Guide: User Guide Ellucian exchange.parchment.com Table of Contents Overview... 2 Product Overview... 3 Access... 3 Transcript Ordering... 3 Request Processing:...
More informationPEOPLESOFT DISASTER RECOVERY. Florida Agricultural and Mechanical University PeopleSoft Disaster Recovery Test October 2007
Florida Agricultural and Mechanical University PeopleSoft Disaster Recovery Test October 2007 Table of Contents PEOPLESOFT DISASTER RECOVERY 1. PURPOSE... 4 2. SCOPE... 5 2.1 BUSINESS SYSTEMS... 5 2.2
More informationLEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationDocumentation for data centre migrations
Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed
More informationOcean Park IT Cloud Solution
Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationRev. 3.0.3. Implementation Guide
Rev. 3.0.3 Implementation Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations,
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationOracle Database 12c: Administration Workshop NEW
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Administration Workshop NEW Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about
More informationThe Partnership. You Can Count On. Seth Pomeroy, Partner NDH Group, Ltd May, 2015
The Partnership You Can Count On Seth Pomeroy, Partner NDH Group, Ltd May, 2015 1 Proposed Agenda The Value of Cloud Financial Management Systems & Reporting Prospective Review: Gain a mutual understand
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationSTATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians
More informationIntegrating OID with Active Directory and WNA
Integrating OID with Active Directory and WNA Hari Muthuswamy CTO, Eagle Business Solutions May 10, 2007 Suncoast Oracle User Group Tampa Convention Center What is SSO? Single Sign-On On (SSO) is a session/user
More informationPCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement
More informationIBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
More informationJoint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Data Handling in University Case Study- Information Security in University Agenda Case Study Background
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationMICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
More informationPREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
More informationTASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
More informationT141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
More informationRSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
More informationCurrent Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support
Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationUsing SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium
Using SharePoint 2013 for Managing Regulated Content in the Life Sciences Presented by Paul Fenton President and CEO, Montrium Overview Informative Webinar that aims to provide an overview of how SharePoint
More informationINFORMATION TECHNOLOGY ENGINEER V
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
More informationHow To Write A Successful Automation Project
ch01.fm Page 1 Thursday, November 4, 1999 12:19 PM Chapter 1 Lights Out Exposed Planning and executing a successful automation project begins by developing realistic expectations for the purpose and scope
More informationUniversity of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
More informationInformation Technology 2008 Major Accomplishments. Application Development
Application Development epas Application Transition to Citizens A three year contract with BIPT for epas development & support concluded in March of 2008. During this timeframe, Citizens IT moved all staffing
More informationNew Systems and Services Security Guidance
New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates
More informationIntroduction. Our Services
Introduction RCMT IT Solutions is a global provider of Custom Software, Infrastructure Technology and Managed Solutions. Offering extensive consulting expertise and professional mastery of the latest technologies,
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
More informationAudit of Employee Self-Service Payroll System Access
Audit of Employee Self-Service Payroll System Access MARTIN MATSON City Comptroller STACEY MAZMANIAN Audit Manager City of Milwaukee, Wisconsin September 2015 TABLE OF CONTENTS Transmittal Letter..1 I.
More information