IT Project Co-Sponsor: John Scoville Project Dependencies:

Size: px
Start display at page:

Download "IT Project Co-Sponsor: John Scoville Project Dependencies:"

Transcription

1 March 1, 2005 Student System Consolidation - Phase I Executive Sponsor: Chancellor Davis Project Manager: Jeff Noyes Project Coordinator: Margaret Dillard Project Sponsor: Vice Chancellor Tom Maier, AVC Tonya Lam IT Project Co-Sponsor: John Graham IT Project Co-Sponsor: John Scoville Project Dependencies: < Include any dependencies surrounding this project including other projects or implementations. > PeachNet GaBEST Model Banner V6 and V7 TouchNet PeopleSoft Financials Interfaces HRMS and Academic Datamarts (USG123) WebCT/VISTA Deployment USOA Legacy Reporting Requirements GALILEO Interface with approved 3 rd party Campus Systems (e.g. parking, bookstore, one card, etc.) Luminis Academic Policy GAcollege411 XML Transferable Transcript Prerequisite for Multi-Institutional Functionality (MIF) Implementation Linkages to the IIT Strategic Plan: < Include the linkages to the IIT Strategic Plan Learning Without Limits > Goal 5.2 in the USG IIT Strategic Plan specifically states Develop objective criteria for decision-making and for determining the most advantageous methods for supplying services and support for the USG.

2 Goals & Objectives: < Include no more than three succinct goals for the project. These statements should be worded so they are easy to remember and adequately reflect the desired outcomes for the project. The objective statement should include possible phases of the project (if applicable), the expected timeframe, and budget information. > Recognizing the need to provide reliable and efficient student services across the University System of Georgia (USG), the Student System Consolidation (SSC) project seeks to consolidate the technical environment for the USG Banner Student Information System into one central location that will serve the six institutions participating in the project: Bainbridge College, Waycross College, South Georgia College, Atlanta Metropolitan College, Fort Valley State University, and Georgia Gwinnett College. Through consolidation, we will improve services across USG with a model implementation of the Banner Student Information System software that will include only the software as released by the vendor and approved GaBEST modifications. The model system will be a supportable, sustainable solution that will result in long-range cost avoidance. With this in mind, the SSC project has identified two major objectives: 1. Establish a consolidated technical environment for the USG Banner Student Information System that integrates well with other enterprise applications. 2. Provide an enhanced level of consistent student services throughout the USG. Background/Narrative: < Provide any pertinent background information and/or drivers of the project. Answer questions such as: Why is this project needed? What has brought about the need for this project? What are the surrounding issues? What functions will be affected? What has been the impact of not having this project implemented? > Although thirty-two USG institutions are operating the same basic Banner Student Information System software, each is providing its own computer equipment, technical staff, and facilities at each local campus. These institutions include large research and regional universities as well as smaller four-year and two-year colleges which have limited resources to support this type of effort. These multiple installations are largely duplicative in computer equipment and senior technical staff. In addition, the separate installations, each with their own support staff, invite separate approaches to service delivery, reporting, data collection, and even data definitions. This highly decentralized operation of the Banner Student Information System is inherently inefficient and costly and often results in inconsistent levels of services to USG students at different institutions as well as difficulties in consistent reporting. The purpose of the SSC project is to establish a single, central computer equipment operation that will provide a common software system to be used by all the participating institutions, resulting in a more efficient, consistent, and feature-rich student information system for USG.

3 Boundaries: < Empowerment limits and project constraints. Answer the questions what is in scope and what is out of scope of the project. > Overall Boundaries The initial planning process for this project is based on the following overall boundaries: 1. In order to improve supportability and ensure a consistent level of student services, the same production version and patch level of Banner and Georgia Enhancements are required of participating institutions. 2. In a consolidated environment, as in the existing campus Banner environments, reliability and consistency can best be ensured when the Banner Baseline product and/or existing Georgia Best model software enhancements are used for common academic business practices. 3. In a consolidated environment, as in the existing campus Banner environments, when legacy business procedures limit the appropriate use of the Banner Baseline product or existing Georgia Best model software enhancements, institutions should always explore the common academic business practices that allow implementation through the Banner Baseline product and/or existing Georgia Best model software enhancements. 4. There may be cases in which accepted academic business practices can not be implemented through the Banner Baseline product and/or existing Georgia Best model software enhancements. A model change review process, governed by the Associate Vice Chancellor for Student Affairs, in conjunction with user groups that are representative of the USG campus community, will be available. This change review process group will be responsible for the acceptance, review, and approval of changes to the model software. 5. When the process in Overall Boundary #4 is used to determine that modifications are appropriate to best benefit all USG institutions, these modification will be incorporated into the consolidated model. Specific Boundaries The SSC project sponsorship has established the following specific boundaries based on knowledge gained from the PeopleSoft environments, an awareness of the different needs of the Banner environment, and the future direction of the development of the SunGardHE Banner application. 1. The following SunGardHE products are not planned or budgeted for in the initial implementation phases of this project: o IVR Voice Response o Luminis Platform Suite (including Portal, content management, calendaring, and SSO) o SUNGARDHE Imaging, Workflow, and other document management applications Note: While the SSC project sponsorship recognizes the importance of these products and services, extensive additional analysis is necessary to determine the best way for the SSC environment to accommodate them. 2. The Multi-Institutional Functionality (MIF) project capabilities are being integrated into baseline Banner. SSC institutions will have this capability with the implementation of the appropriate Banner version upgrade 3. Experienced campus personnel are, and will remain, the best avenue to provide primary functional user support. The OIIT Customer Service HelpDesk may be contacted for secondary support as necessary. Escalation of issues with SunGardHE through OIIT has been extended to include 24x7 support. 4. The SSC project will establish uptime availability for the hosted environment as follows: o OIIT will perform regular backups and other scheduled maintenance that will require SSC service downtime according to the OIIT Service Level Guidelines, a published maintenance schedule and process.

4 o If the repetitive testing of any upgrade process proves the tasks associated with an upgrade cannot be completed during the regular maintenance window or over a weekend, extended downtime will be scheduled with prior notice. o A comprehensive backup plan for maximum recoverability will be developed and tested and will use enterprise-class storage solutions and a combination of backup solutions. o A retention cycle for backup sets of at least a 7 day, 4 week, and 4 month cycle will be maintained. Additional backup retention periods may be necessary to address needs during agreed upon academic processing cycles that coincide with the published System Office academic processing cycles. 5. In order to create an efficient and reliable environment, the SSC project will establish the characteristics of the hosted environment as follows: o The Banner database and application servers for the SSC environment will be housed in a hardened facility in Athens. o In order to establish a common quality assurance process, the SSC environment will provide each participating campus with one pre-production environment that may be used for campus testing purposes. Read-only access outside of the Banner application will be provided in this pre-production environment to facilitate reporting. No development or update access outside of the Banner application will be provided to end users of the pre-production environment. User privileges and accesses will be established in this environment as a mimic of production privileges and accesses to ensure the integrity of testing of upgrades, patches, and releases prior to application to production. o The SSC environment will provide each participating campus with one production environment. Read-only access outside of the Banner application will be provided in the production environment to facilitate reporting and execution of read-only interfaces. To protect campus data, no development or update access outside of the Banner application will be provided to end users of the production environment. o The SSC project sponsorship will establish a common process for data updates outside the Banner application with data recovery points. o Campuses will retain the ability and responsibility to customize their Banner Self Service pages through the use of Web Tailor. o The SSC environment will use firewall protection and encryption where appropriate. o The SSC environment for production will be implemented at the most recently released version of the Banner and the Georgia Enhancements. o SunGardHE will discontinue the support of the Banner client/server during the implementation phase(s) of the SSC project. Therefore, in order to provide for the smoothest transition for administrative users, Internet Native Banner (INB) will be used in the SSC environment to provide administrative access to Banner. Traditional Banner GUI (client/server) access will not be provided to administrative users in the SSC environment. o In order to provide the most secure and accountable environment, UNIX shell accounts or telnet/ssh will not be supported in the SSC environment. Mechanisms will be provided to enable users to securely upload tape load files for batch processing and to review the status of jobs that have been submitted through Banner job submission. o A job scheduler will be provided to allow campus-designated technical personnel to schedule and maintain end user jobs for their campus without having an adverse impact on the shared resource. UNIX scheduling through cron or at jobs will not be supported. o The SSC environment will establish a database naming convention that is similar to the PeopleSoft naming

5 convention so as to easily identify the institution and to distinguish between production and non-production environments. o The SSC environment will use default Banner seed numbers. This will eliminate the need to reset seed numbers in multiple areas within the SSC environment for each upgrade. o With the exception of Banner Self Service, the SSC environment will allow access to Banner for administrative users only from the IP address space of PeachNet. Banner Self Service will be accessible in SSL-enabled mode from a supported browser on the WAN. o The SSC environment will provide browser-based delivery for Banner output. o Reporting and read-only database access in the SSC environment will require the ability to initiate an encrypted client session. 6. To ensure the security of the environment, the SSC project will establish user access to the hosted environment as follows: o Because the current architecture of the Banner environment allows creation of DBA level accounts from the Banner Security objects, the central support group will initially create the new Banner user accounts in the proposed SSC environment databases. This will only involve the creation of the initial accounts to establish the account using rules suggested by the State Department of Audits and the Administrative Committee for Information Technology (ACIT). Campus personnel will retain the ability and responsibility to define user classes and access levels and enter the information into administrative Banner. o Database password strength for new accounts will be set and enforced using password strength algorithms. o The SSC environment will not include the ability for campus personnel to create direct database access accounts. o The SSC environment will not provide Oracle login access to Banner schema owner accounts (i.e. general, arsys, faismgr, taismgr, baninst1, WebTailor, etc.) to campus personnel. o The SSC environment will not enable campus personnel to create customized database objects (tables, PL/SQL objects, etc.). o The SSC environment will not enable campus personnel to modify existing Banner Baseline or Georgia Best model enhanced database objects except as participants of a governed change management and joint development process as defined in Overall Boundary # The SSC project will establish supported solutions for data updates outside of the Banner Baseline application forms and/or processes as follows: o The SSC environment will not provide the campus community at large with direct access to update Banner data outside of the administrative Banner application or Banner Self Service. o The SSC environment will provide the ability to transfer files to the individual participating institution s hosted environment to support tape load processes that are a part of the Banner Baseline product and/or existing Georgia Best model software enhancements. o In the SSC environment, batch updates, including update interfaces, to Banner outside of the administrative Banner application or Banner Self Service, will be treated as data base interventions (DBIs). Campus personnel will develop DBIs that follow a change migration cycle of application to-test-environment by the central support group, testing, approval, and written sign-off by campus authority; and application to a production environment by the central support group following a backup cycle, during which a verified recovery point will be taken. 8. The SSC project will establish supported solutions for end user reporting and outbound interfaces as defined below:

6 o The SSC environment will provide a reporting environment to allow flexibility in reporting options at the institutional level for the participating campuses. o The SSC environment will create at least one reporting role and user account for each campus database to support ad hoc reporting and read-only interfaces from all the Banner schemas outside of the Banner application-provided reports. If a set of job-specific or schema-specific roles for reporting outside of the Banner application need to be defined, the SSC project members will rely upon the governing user group(s) to define and document the access associated with the various reporting roles. o Data extracts from Banner in the SSC environment to 3 rd party systems (such as parking or ID card systems) will be handled as read-only interfaces. The reporting role(s) and account provided by the SSC environment will be used to execute data extracts from Banner. o Read-only database access in the SSC environment will require the ability to initiate an encrypted client session. 9. The SSC project will establish beta testing, user acceptance testing periods, and methods as follows: o The SSC environment will provide a read-only, pre-production environment for each participating institution that will be established with the same privileges and accesses as the production environment. The preproduction environment will be used by participating campuses for testing Banner or Georgia Best model software processes and procedures prior to execution in production. o The SSC project will schedule upgrades during specified upgrade windows for a period of time based on the complexity, timing, and relative content of the specific upgrade. o The SSC project will support and observe one common quality assurance process for testing and certification for Banner and Georgia Best model software enhancements in cooperation with the common development environment as defined in Specific Boundary #8. o The SSC project will establish supported solutions for development of non read-only modification as follows: - The SSC project will provide one common development environment that can be shared by all institutions that participate in joint development of approved modification for the project while not interfering with reporting efforts. - The SSC project sponsorship will provide a process to develop, test, certify, and deploy common services. Therefore, the SSC project will support on change management process that will be governed by the process defined in Overall Boundary #4. - The SSC project will support one common joint development agenda as defined by the governed change review process referred to Overall Boundary #4. - The SSC project will provide all participating campuses with access to the common development environment. The SSC project will not provide individual development environments to campuses.

7 Deliverables: < Tangible and intangible products, processes, results and services > 1. Centrally managed disaster recovery and technical business continuity plan for hosted applications. 2. Technical framework to support standardization of business practices. 3. Central management of certain security tasks for hosted application tests following ACIT and OIIT security guidelines including change control procedures for application source code, security awareness training, application of vendor security patches and conducting periodic security penetration tests x 7 hardware support with 4 hour vendor response time for hardware maintenance. 5. SSL encryption for Banner Self-Service (Banner Web) 6. Uniform backup strategy for hosted application, including an automated tape management and tape retirement strategy. 7. Enterprise job scheduling for administrative users using a job scheduler. 8. Service availability monitoring for the hosted application. 9. A service level guideline. 10. Remotely accessed campus reporting environment. 11. Remotely accessed joint developer environment.

GeorgiaBEST Banner 8 Institutional Web Conference. March 30, 2009

GeorgiaBEST Banner 8 Institutional Web Conference. March 30, 2009 Institutional Web Conference March 30, 2009 AGENDA V8 Implementation Schedule Changes in functionality Technical Update General Discussion OIIT Deployment Schedule Campus Implementation Schedule TEST by

More information

Module 7: System Component Failure Contingencies

Module 7: System Component Failure Contingencies Module 7: System Component Failure Contingencies Introduction The purpose of this module is to describe procedures and standards for recovery plans to be implemented in the event of system component failures.

More information

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.

Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier

More information

Single Sign On for TouchNet Products Workbook. Information Technology Services

Single Sign On for TouchNet Products Workbook. Information Technology Services Single Sign On for TouchNet Products Workbook November 2010 This page left blank to facilitate front/back printing. Table of Contents Table of Contents Single Sign On Functionality for TouchNet Products...

More information

Georgia Tech s Luminis IV Beta Testing

Georgia Tech s Luminis IV Beta Testing SUNGARD SUMMIT 2007 sungardsummit.com 1 Georgia Tech s Luminis IV Beta Testing Presented by: Steve Goeke Georgia Tech March 22, 2007 A Community of Learning Agenda Portal Environment and Architecture To

More information

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures 1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities

More information

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions

Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current

More information

OWG 60 IT Backend Systems Approved Recommendations

OWG 60 IT Backend Systems Approved Recommendations OWG 60 IT Backend Systems Approved Recommendations 1. Recommends working with OWG 62 on developing a comprehensive inventory tracking process for the new institution inventory and record all assets purchased

More information

State of Wisconsin Database Hosting Services Roles and Responsibilities

State of Wisconsin Database Hosting Services Roles and Responsibilities State of Wisconsin Hosting Services oles and esponsibilities Document evision History (Major Post Publishing evisions Only) Date Version reator Notes 12/9/2010 1.0 This document describes the Hosting Services

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Guide Parchment to Implementation and User Automation: Guide PeopleSoft

Guide Parchment to Implementation and User Automation: Guide PeopleSoft Guide Parchment to Implementation Send K-12 and User Automation: Guide PeopleSoft 2 Contents OVERVIEW 3 PRODUCT OVERVIEW 4 Access 4 Transcript Ordering 4 Request Processing 4 Transcript Request Fulfillment

More information

System Requirement Specifications (SRS)

System Requirement Specifications (SRS) (SRS) Assignment 1 Sample Solution 1 Table of Contents 1 Table of Contents... 1 2 Problem Statement... 2 3 Overview... 2 3.1 Background... 2 3.2 Overall Description... 2 4 Investigation & Analysis Methodology...

More information

Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011

Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011 Oracle Fixed Scope Services Definitions Effective Date: October 14, 2011 "You" and "your" refers to the individual or entity that has ordered Advanced Customer Services from Oracle or an authorized distributor.

More information

Division of IT Security Best Practices for Database Management Systems

Division of IT Security Best Practices for Database Management Systems Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING 6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information

More information

Georgia Tech Active Directory Policy

Georgia Tech Active Directory Policy Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

User Interface Modernization Banner Self-Service

User Interface Modernization Banner Self-Service User Interface Modernization Banner Self-Service User Interface Modernization: Goals User-centric design approach It s about the user - not the technology! Improve usability through consistent, effective

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

D50323GC20 Oracle Database 11g: Security Release 2

D50323GC20 Oracle Database 11g: Security Release 2 D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their

More information

Information Security Operational Procedures

Information Security Operational Procedures College Of Coastal Georgia Information Security Operational Procedures Banner Student Information System Security Policy INTRODUCTION This document provides a general framework of the policy utilized by

More information

Banner DBA Survival Guide

Banner DBA Survival Guide SUNGARD SUMMIT 2007 sungardsummit.com 1 Banner DBA Survival Guide Presented by: Kathleen O Donnell, Pacific Lutheran University March 20, 2007 Course ID: 029 A Community of Learning Introduction Purpose

More information

InForm On Demand Single Trial Services Description

InForm On Demand Single Trial Services Description InForm On Demand Single Trial Services Description Version 7.0 Effective Date: 0 25-Sep-2014 This is the Services Description for Oracle InForm On Demand Single Trial ( Schedule ) to Your Study Order for

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Change Management Procedures Re: The Peoplesoft Application at Mona

Change Management Procedures Re: The Peoplesoft Application at Mona Change Management Procedures Re: The Peoplesoft Application at Mona (The original Peoplesoft document was modified to relate more closely to UWI Mona) See also.. MITS Project Management Methodology & MITS

More information

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),

More information

Innovation through Outsourcing

Innovation through Outsourcing Innovation through Outsourcing Timothy Gehrig timothy.gehrig@cedarcrestone.com David Moore david.moore@cedarcrestone.com Agenda Expectations CedarCrestone Introduction Market Direction Outsourcing Solutions

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

<Insert Picture Here> Best Practices from Oracle Managed Services for Maintenance and Support of Oracle Solutions

<Insert Picture Here> Best Practices from Oracle Managed Services for Maintenance and Support of Oracle Solutions Best Practices from Oracle Managed Services for Maintenance and Support of Oracle Solutions dr.ir. Wouter Schmidt Solution Architect Sigrun Bichlmeier Business Development Manager

More information

Information Technology Plan 2010 2011

Information Technology Plan 2010 2011 Information Technology Plan 2010 2011 September 2010 The FY10-11 IT plan was developed through collaboration with IT staff and engagement with IT governance groups. In the budget-constrained environment,

More information

United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment

United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment United States Department of State Global Financial Management System (GFMS) Privacy Impact Assessment CGFS/DCFO/GFMS 1. Contact Information Privacy Impact Assessment (PIA) Department of State Privacy Coordinator

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,

More information

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.

Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above. ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that

More information

DATABASE ANALYST I DATABASE ANALYST II

DATABASE ANALYST I DATABASE ANALYST II CITY OF ROSEVILLE DATABASE ANALYST I DATABASE ANALYST II DEFINITION To perform professional level work in designing, installing, managing, updating, and securing a variety of database systems, including

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

VMware Cloud Automation Design and Deploy IaaS Service

VMware Cloud Automation Design and Deploy IaaS Service DATASHEET VMware Cloud Automation AT A GLANCE The VMware Cloud Automation Design and Deploy IaaS Service expands the power of virtualization and moves IT services away from existing infrastructure delivery

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Service Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support

Service Support. First Level Support (Tier I) provides immediate response to emergencies and customer questions. TSD - First Level Support Service Support 1.1. First Level Support First Level Support (Tier I) provides immediate response to emergencies and customer questions TSD - First Level Support Office: Sub-Division: Extension: E-mail:

More information

Banner overview. Authentication to Banner & 3 rd Party Apps. Authorization to Banner & 3 rd Party Apps

Banner overview. Authentication to Banner & 3 rd Party Apps. Authorization to Banner & 3 rd Party Apps Banner overview Authentication to Banner & 3 rd Party Apps Authorization to Banner & 3 rd Party Apps 1 Section 1 Higher Education Enterprise Resource Planning (ERP) system. Original vendor SunGard Higher

More information

Oracle Database 11g: New Features for Administrators DBA Release 2

Oracle Database 11g: New Features for Administrators DBA Release 2 Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change

More information

Time to Value: Successful Cloud Software Implementation

Time to Value: Successful Cloud Software Implementation Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Information Technology General Controls (ITGCs) 101

Information Technology General Controls (ITGCs) 101 Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda

More information

Project Charter and Scope Statement

Project Charter and Scope Statement Prepared by: Mike Schmidt Version: 1.0 Last Revision Date: April 14, 2010 Create Date: May 6, 2010 EXECUTIVE SUMMARY... 3 1 INTRODUCTION... 4 2 PROJECT OBJECTIVES... 4 2.1 MISSION... 4 2.2 OBJECTIVES...

More information

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days)

6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) www.peaklearningllc.com 6422: Implementing and Managing Windows Server 2008 Hyper-V (3 Days) Introduction This three-day instructor-led course teaches students how to implement and manage Windows Server

More information

IBM AIX MANAGED SERVICES:

IBM AIX MANAGED SERVICES: IBM AIX MANAGED SERVICES: REMOTE MONITORING REMOTE ADMINISTRATION MANAGED HOSTING Reduce Your IBM AIX (pseries) Operating Costs & Get Higher Uptime. Let Connectria Help Run Your IBM AIX (pseries) Environment.

More information

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery

More information

INSTALLATION AND CONVERSION PLAN

INSTALLATION AND CONVERSION PLAN INSTALLATION AND CONVERSION PLAN Integrated Procurement System (Case Study) U.S. Election Commission INSTALLATION AND CONVERSION PLAN TABLE OF CONTENTS Page # 1.0 INSTALLATION OVERVIEW...1 2.0 SECURITY

More information

The Project Management Plan will be used to guide, communicate and coordinate project efforts.

The Project Management Plan will be used to guide, communicate and coordinate project efforts. F.1 General Implementation Contractor Deliverables include critical system planning and development components. Sufficient deliverables have been identified at key steps in the project to guide the project

More information

exchange.parchment.com

exchange.parchment.com Automation Parchment Send Implementation K-12 Guide: User Guide Ellucian exchange.parchment.com Table of Contents Overview... 2 Product Overview... 3 Access... 3 Transcript Ordering... 3 Request Processing:...

More information

PEOPLESOFT DISASTER RECOVERY. Florida Agricultural and Mechanical University PeopleSoft Disaster Recovery Test October 2007

PEOPLESOFT DISASTER RECOVERY. Florida Agricultural and Mechanical University PeopleSoft Disaster Recovery Test October 2007 Florida Agricultural and Mechanical University PeopleSoft Disaster Recovery Test October 2007 Table of Contents PEOPLESOFT DISASTER RECOVERY 1. PURPOSE... 4 2. SCOPE... 5 2.1 BUSINESS SYSTEMS... 5 2.2

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Documentation for data centre migrations

Documentation for data centre migrations Documentation for data centre migrations Data centre migrations are part of the normal life cycle of a typical enterprise. As organisations expand, many reach a point where maintaining multiple, distributed

More information

Ocean Park IT Cloud Solution

Ocean Park IT Cloud Solution Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Rev. 3.0.3. Implementation Guide

Rev. 3.0.3. Implementation Guide Rev. 3.0.3 Implementation Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations,

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Oracle Database 12c: Administration Workshop NEW

Oracle Database 12c: Administration Workshop NEW Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Administration Workshop NEW Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about

More information

The Partnership. You Can Count On. Seth Pomeroy, Partner NDH Group, Ltd May, 2015

The Partnership. You Can Count On. Seth Pomeroy, Partner NDH Group, Ltd May, 2015 The Partnership You Can Count On Seth Pomeroy, Partner NDH Group, Ltd May, 2015 1 Proposed Agenda The Value of Cloud Financial Management Systems & Reporting Prospective Review: Gain a mutual understand

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

Integrating OID with Active Directory and WNA

Integrating OID with Active Directory and WNA Integrating OID with Active Directory and WNA Hari Muthuswamy CTO, Eagle Business Solutions May 10, 2007 Suncoast Oracle User Group Tampa Convention Center What is SSO? Single Sign-On On (SSO) is a session/user

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Data Handling in University Case Study- Information Security in University Agenda Case Study Background

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes

T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support

Current Environment Assessment Specification. Single Sign On Customer Relation Management Workstation Support Current Environment Assessment Specification Single Sign On Customer Relation Management Workstation Support Georgia State University By: Team #2 Members: Igor Wolbers Tony Yuan Saeed Nadjariun Team2 Version

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium Using SharePoint 2013 for Managing Regulated Content in the Life Sciences Presented by Paul Fenton President and CEO, Montrium Overview Informative Webinar that aims to provide an overview of how SharePoint

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

How To Write A Successful Automation Project

How To Write A Successful Automation Project ch01.fm Page 1 Thursday, November 4, 1999 12:19 PM Chapter 1 Lights Out Exposed Planning and executing a successful automation project begins by developing realistic expectations for the purpose and scope

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

Information Technology 2008 Major Accomplishments. Application Development

Information Technology 2008 Major Accomplishments. Application Development Application Development epas Application Transition to Citizens A three year contract with BIPT for epas development & support concluded in March of 2008. During this timeframe, Citizens IT moved all staffing

More information

New Systems and Services Security Guidance

New Systems and Services Security Guidance New Systems and Services Security Guidance Version Version Number Date Author Type of modification / Notes 0.1 29/05/2012 Donna Waymouth First draft 0.2 21/06/2012 Donna Waymouth Update re certificates

More information

Introduction. Our Services

Introduction. Our Services Introduction RCMT IT Solutions is a global provider of Custom Software, Infrastructure Technology and Managed Solutions. Offering extensive consulting expertise and professional mastery of the latest technologies,

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

Audit of Employee Self-Service Payroll System Access

Audit of Employee Self-Service Payroll System Access Audit of Employee Self-Service Payroll System Access MARTIN MATSON City Comptroller STACEY MAZMANIAN Audit Manager City of Milwaukee, Wisconsin September 2015 TABLE OF CONTENTS Transmittal Letter..1 I.

More information