August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. Table of Contents Definitions Bona fide identity. Digital identity.
|
|
- George Lang
- 8 years ago
- Views:
Transcription
1 August 14, 2007 Chapter 2. Identity Management Requirements Identity Management. A comprehensive set of tools and processes for creating and managing digital identities for all entities that are affiliated in some capacity with U-M and that need access to IT resources. Table of Contents Definitions... 1 What Is Identity Management?... 2 How Will It Be Used?... 2 Business Process Model... 3 Dependencies... 3 Business Requirements... 3 Appendix 2-A: Populations and Data Sources... 4 Appendix 2-B: Search-Match and Minimum Data Requirements... 4 Appendix 2-C: Identity Lifecycle Use-Case Analysis... 4 Definitions Bona fide identity. An identity supplied to MCommunity that was generated in an institutional source system, such as the Human Resources or Information system, using established institutional identity creation practices and therefore possessing an inherent high level of assurance and validity. Digital identity. The electronic representation of a real-world entity. The term is usually taken to mean the online equivalent of an individual human being, which participates in electronic transactions on behalf of the person in question. However, a broader definition
2 also assigns digital identities to organizations, companies, and even individual electronic devices. 1 Strong identity. An identity in MCommunity that contains adequate identity data to confidently match against identities in other systems. Weak identity. An identity in MCommunity that lacks adequate identity data to confidently match against identities in other systems. What Is Identity Management? Identity Management is a comprehensive set of tools and processes for creating and managing digital identities for all entities that are affiliated in some capacity with U-M and that need access to IT resources. Identity Management also includes capabilities to manage non-person entries in the Directory. 2 Identity Management is not a monolithic application, but rather a series of tasks performed by multiple software components and technologies. MCommunity Identity Management is not a provisioning system; its tools manage identity data but do not assign resources. Provisioning tools and logic outside of Identity Management will be used to assign resources. Resource owners will be able to define and implement criteria, based on identity data, that will be used to grant and revoke access to resources. How Will It Be Used? Identity Management will be used to: Implement a comprehensive identity lifecycle management process that Creates identities in the Registry. Assigns LoginIDs (also known as uniqnames). Populates IDs in the Directory. Manages data changes in the Registry and Directory. Depopulates IDs from the Registry and Directory. Facilitate the creation and management of non-person identities for the purpose of providing access to MCommunity systems and resources. Utilize Workflow to automate identity creation and management processes. 1 From 2 Non-person entries would include, for example, system identifiers such as root, bin, oracle, and others, which are specific to particular environments and ought to be reserved, but which need no other central resources. Non-person entries also include keytabs, special login identities, pt instances, and other resources used for automated processes. page 2
3 Business Process Model Dependencies MCommunity Identity Management is dependent on: Authoritative sources of identity data for creating and managing bona fide identities. These include, the Dearborn and Flint Banner systems, and the Development Constituent (DAC) system. The Sponsor System to create and manage non-bona fide identities The Identity Vault to store identity data and on other processes to manage the population and management of the identity data in the Directory; assign and manage uniqnames, UIDNumbers, and GIDNumbers; and to manage memberships in Institutional Roles. 3 Business Requirements These business requirements focus on meeting the needs of unit IT staff, unit administrative staff, and end users. For End Users (Interactive Access) 1. Uniqnames will be either assigned or self-chosen for an identity, ensuring uniqueness and naming standards. 2. Via Workflow, users with assigned uniqnames will be notified of their assigned LoginID and UMICH Kerberos password. For System Administrators (Programmatic Access) 3. Identity Management will create and manage Kerberos Principals for identities in MCommunity. 4. Any authoritative source will be able to create a new identity. 5. Identities will be assigned a system-generated unique identifier. 6. A process responsible for performing the consolidation of identity data from multiple sources and enforcing the data precedence rules defined by the Governance Board will be in place.) NOTE: The Governance Board has yet to define precedence of data from multiple sources, which will be present in the Directory. 7. Identity Management will populate identities into the Directory as specified by criteria set forth by the Governance Board. 3 See: University of Michigan, Enterprise Directory Services Phase 2 Governance Board Recommendations, Ann Arbor, Michigan, July This is included in Chapter 1 and is on the web. page 3
4 8. A process will be responsible for assigning unique identifiers (for example, UIDNumbers and GIDNumbers). 9. Identity Management will provide the ability to manage non-person identities in the Directory, which could include system related identities, or other types of objects (rooms, hardware, networks.) NOTE: This needs further definition to determine true needs and business relevance for MCommunity. Appendix 2-A: Populations and Data Sources Enterprise Directory Population Current employees & emeritus faculty at all three campuses Ann Arbor active students, including incoming students Flint active students, including incoming students Dearborn active students, including incoming students U-M Online (UMOL) subscribers Living alumni Other sponsored individuals Data Source M-Pathways database M-Pathways database Banner student information system Banner student information system ITCS UMOL database DAC database MCommunity will include a Sponsor System for managing identities for these individuals. Appendix 2-B: Search-Match and Minimum Data Requirements The minimum data required to create a UMID or match to an existing UMID is any one of the following three data combinations: Combination One Combination Two Combination Three First Name First Name First Name Last Name Last Name Last Name Social Security Number Social Security Number Date of Birth Date of Birth Gender Gender Address Address Additional data could include uniqname, UMID (if known), external system id, former names, and nicknames. Appendix 2-C: Identity Lifecycle Use-Case Analysis This use case provides an example of the many events that might occur during the lifecycle of a particular identity in the MCommunity system. Use Case Summary Li Ping, who lives in China, applies to the University of Michigan Engineering School. She matriculates, chooses liping as her uniqname, arrives in Ann Arbor two weeks before school starts, goes through orientation, and moves into a residence hall at the beginning of the term. During her first term, she applies for a job and is hired as a temporary employee. After her first year at U-M, she moves from the residence hall to an apartment. She decides to change her preferred name to Linda Ping. In her last semester of school, Linda marries and requests that her uniqname be changed to lsmith to match her new last name (Smith). The couple moves into a house. Linda s spouse uses her account (and, therefore, her identity) to send hate mail to the White House. The User Advocate steps in and temporarily disables the account. A divorce happens shortly afterwards. Linda changes her last name back to Ping and requests that her uniqname be changed back to liping. Linda graduates and moves to Houston. She loses access to her IFS file space when she is no longer a student. page 4
5 Assumptions is the authoritative data source for events such as matriculation and registration. Detailed Use Case Events Event Process Attributes in the Directory Li Ping applies to U-M and is admitted. She matriculates. Necessary information is entered in, and UMID is created or updated. contains l bio-demo and address data. Possible problem: Duplicate UMID exists and must be resolved. Initial student record (see schema) is sent to the Directory. User self registers uniqname and can go to cosign-enabled websites, register for classes, get housing, and so on. BCP is set up automatically. *Check with Novell about Identity/uniqname selfregistration process None Personal Data Academic Data Uniqname (liping) Password BCP Registry entry Information hidden in white pages Private flag on (will be brought to/confirmed with the Gov. Board) Institutional Roles None AA Authoritative Data Source She attends orientation and registers for classes. Gets M-card Enrollment data sent to Personal Data Academic Data Enrollment Data Uniqname Password BCP Registry entry AA Arrives on campus and starts classes. Becomes temp employee. Privacy flag is on. A week before classes start (?), the privacy flag is taken off, and actual FERPA starts? Job data added to FERPA flag change in BCP data and Directory entry Directory entry affiliation addition FERPA protection changes AA AA AA Temp Moves from res. hall to apartment. Takes summer classes in Dearborn. Changes preferred name. Address changes in Enrolls in Dearborn classes needs access to resources in Dearborn Name updated in Address updated in Dearborn student data Preferred name added to AA AA Dbn Dbn Enrolled AA Dearborn page 5
6 Event Process Attributes in the Directory Marries and requests uniqname change. Moves to the house. Husband abuses her login privileges. Campus ID (uniqname) changed in Any effect on job data? No Address change in User advocate finds out New uniqname - lsmith Address updated in Account is disabled How is account restored- by divorce? Institutional Roles AA AA AA Divorces. Any effect on job data? No AA Requests uniqname change. Graduates. Job ends. uniqname updated in Update to academic data Update to job data Uniqname changes to lping data removed data removed AA Authoritative Data Source Moves to Houston. Updates address with alumni office Address updated in See the MCommunity website for additional scenarios. page 6
Enterprise Directory Services Phase 2 Governance Board Recommendations
MAIS Information Technology Central Services and Michigan Administrative Information Services Enterprise Directory Services Phase 2 Governance Board Recommendations Populations and Data Sources The goal
More informationIT Commons Enterprise Directory Services Project
Business Case and Funding Proposal IT Commons Enterprise Directory Services Project Table of Contents Executive Summary...3 Introduction...4 Statement of Opportunity...4 Current State of Directories...5
More informationDATA AND USER ACCESS POLICIES
Contents UNIVERSITY OF CHICAGO ALUMNI & DEVELOPMENT DATABASE (GRIFFIN) DATA AND USER ACCESS POLICIES Approved by the Griffin Steering Committee 2/1/07 What is Griffin? Griffin Policies & Procedures Your
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationGraduate Certificate Application Form and Checklist
Graduate Certificate Application Form and Checklist 6530 Haven Hall, 505 South State Street, Ann Arbor, MI 48109 Tel: (734) 615-3275 Email Application to: cogsciprog@umich.edu www.lsa.umich.edu/weinberginstitute
More informationStephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
More informationPROJECT CONTROL DOCUMENT
PROJECT CONTROL DOCUMENT PERSISTENT EMAIL (AKA EMAIL MODEL) EM-PCD-001 Draft 06/09/2004 Prepared by Don D Worth UCLA PERSISTENT EMAIL Copyright 2002-2004, The Regents of the University of California All
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization
More informationPROGRAM OVERVIEW 4 PROGRAM GOVERNANCE 4 COURSEWORK 5
University of Michigan Dearborn College of Education Health and Human Services Doctorate of Education Student Handbook Approved January 2015 Updated January 2015 2 MISSION STATEMENT: 3 ED. D. GUIDING PRINCIPLES
More informationActive Directory at the University of Michgan. The Michigan Way Since 2000
Active Directory at the University of Michgan The Michigan Way Since 2000 Introductions Who I am: Christina Fleming (cmhf) Who you are: Your Name Your Department How long have you worked with AD? What
More informationUniversity of Michigan STUDENT SERVICES: ADMISSIONS
RACKHAM GRADUATE SCHOOL University of Michigan STUDENT SERVICES: ADMISSIONS 915 E. Washington Street 0120 Rackham Building Ann Arbor, MI 48109-1070 E-Mail: rackadmis@umich.edu www.rackham.umich.edu/prospective-students/admissions
More informationIdentity & Access Management Lifecycle Committee. April 13, 2015 Monday Smith Center 561
Identity & Access Management Lifecycle Committee April 13, 2015 Monday Smith Center 561 Agenda Special Guests: Employee IAM Lifecycle Onboarding Workflow Early Entry Into PeopleSoft, I-9 Process Special
More informationNDPERS Member Self Service Guide. Employee Guide. (Rev. 8.8.2014)
NDPERS Member Self Service Guide Employee Guide (Rev. 8.8.2014) Table of Contents Getting Your NDPERS Member ID. Page 2 Instructions for Logging into PERSLink Member Self Service (MSS)..Page 3 13 What
More informationImplementation of Open Researcher and Contributor ID. (ORCID) at a Large Academic Institution
Implementation of Open Researcher and Contributor ID (ORCID) at a Large Academic Institution Merle Rosenzweig*, AMLS Informationist Taubman Health Sciences Library, University of Michigan Abstract ORCID
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationTSM Backup Service. Standard Service Level Agreement
TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and
More informationTHE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM
I. Purpose & Scope THE UNIVERSITY OF MICHIGAN IDENTITY THEFT PREVENTION PROGRAM The Identity Theft Prevention Program was developed pursuant to the Federal Trade Commission s Red Flag Rules promulgated
More informationeschoolplus Katy Independent School District Enrollment Online
Enrollment Online Table of Contents How to find Enrollment Online... 3 How to Register with Enrollment Online... 3 Create a New Enrollment Online Form... 3 Input/Select Data in the Form... 4 Student Information
More informationGeorgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity
More informationWeb Application Access
This guide provides information on: Establishing a WAM account for those individuals who do not have an EPA LAN account Logging on to Web Application Access (WAA) Viewing and entering your communities
More informationSteps for provider to acquire A&A login credentials and make renewal payment
Steps for provider to acquire A&A login credentials and make renewal payment *** PLEASE NOTE: The changes to System Registry are such that a provider can either pay their own renewal or designate a service
More informationEnhancing Collaboration by Extending the Groups Directory Infrastructure. James Cramton Brown University
Enhancing Collaboration by Extending the s Directory Infrastructure James Cramton Brown University Why We are Here De-duplication without all the facts Software in central business system identifies individuals
More informationINCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES
INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access
More informationOlin Emergency Alert System (Olin EAS)
1. How do I log in to Olin EAS to register? Olin Emergency Alert System (Olin EAS) Log in to the system by clicking on the following link: Olin EAS Self-Registration Portal. Once you are on the site complete
More informationOracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions
Oracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions April 2011 9.0 Oracle s PeopleSoft 9.0 Recruiting and Admissions: Managing PeopleSoft Admission Transactions
More informationNORTH CENTRAL MICHIGAN COLLEGE PARTNERSHIP
NORTH CENTRAL MICHIGAN COLLEGE PARTNERSHIP Through the NCMC partnership, students enrolled in the Young Americans Performance Certificate can opt to concurrently enroll in up to 12 credits each semester
More informationIDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
More informationChapter 11 - Fiscal and Business Affairs - Fees and Charges Page 11-1 Code of Policies CHAPTER 11 FISCAL AND BUSINESS AFFAIRS - FEES AND CHARGES
Chapter 11 - Fiscal and Business Affairs - Fees and Charges Page 11-1 CHAPTER 11 FISCAL AND BUSINESS AFFAIRS - FEES AND CHARGES Sections: 11.010. Enrollment Fees 11.020. Housing Charges 11.030. Other Student
More informationLearning About Financial Aid. Katherine Allen Financial Aid Workshop November 14, 2015
Learning About Financial Aid Katherine Allen Financial Aid Workshop November 14, 2015 Topics for Today College Costs Types of Financial Aid All About the FAFSA What Happens Next? Direct Cost Expenses paid
More informationEnterprise Directory Project Pre-Feasibility Study Information and Educational Technology
UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an
More informationDISTANCE EDUCATION. Dual Credit Responsibilities. Table of Contents. Handbook. Introduction... 2. Welcome to EPCC Dual Credit Program!...
I thin k Handbook DISTANCE EDUCATION Dual Credit Responsibilities Table of Contents Introduction... 2 Welcome to EPCC Dual Credit Program!... 3 Section 1: High School Instructional Facilitator Responsibilities...
More informationIdentity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University
Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4
More informationFERPA Q &A for Banner Users. November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel
FERPA Q &A for Banner Users November 15, 2013 Meredith Braz, Registrar and Kevin D. O Leary, Associate General Counsel FERPA tutorial http://www.dartmouth.edu/~reg/guides/ferpa/ FERPA = Family Educational
More informationActive Directory User Management System (ADUMS)
Active Directory User Management System (ADUMS) Release 2.9.3 User Guide Revision History Version Author Date Comments (MM/DD/YYYY) i RMA 08/05/2009 Initial Draft Ii RMA 08/20/09 Addl functionality and
More informationNovell to Microsoft Conversion: Identity Management Design & Plan
Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History
More informationProject Charter for ITPC-0375
9-16-2011 Page 1 of 12 Project Charter for ITPC-0375 Prepared by: Daryl Fritchey Project Name ITPC-0375 Identity and Access Management (IAM) Implementation IAM Executive Sponsors Chair Michael Hites, Executive
More informationEthical Hacking Agreement for External Network Security Unannounced Penetration Test
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Agreement made on the (date), between (Name of Consultant) of (street address, city, state, zip code), referred to herein
More informationBusiness and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
More informationInformation Packet for AY2014 15 Undergraduate Fellowships For Current UM Ann Arbor Undergraduate Students. Important note to interested students
Information Packet for AY2014 15 Undergraduate Fellowships For Current UM Ann Arbor Undergraduate Students Important note to interested students University of Michigan International Institute is holding
More informationPolicy: Motor Vehicle Record Policy for Drivers of University Vehicles
Policy: Motor Vehicle Record Policy for Drivers of University Vehicles Financial Affairs Department Insurance and Risk Management Effective: June 2005 Revised: January 2014 I. PURPOSE The purpose of this
More informationHow To Request A gtid# (Georgia Tech Identification Number)
How To Request A gtid# (Georgia Tech Identification Number) Revised 01/2006 What Is a gtid#? The Georgia Tech Identification Number, or gtid#, serves as a unique identifier for each individual (constituent)
More informationIvy Tech Community College of Indiana
Ivy Tech Community College of Indiana POLICY TITLE Family Educational Rights and Privacy Act (FERPA) POLICY NUMBER 3.6 (Former APPM 3.4) PRIMARY RESPONSIBILITY Student Affairs CREATION / REVISION / EFFECTIVE
More informationInformation Security Awareness Training Family Educational Rights and Privacy Act (FERPA)
Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA) The FERPA training packet is part of the Information Security Awareness Training that must be completed by employees.
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Victoria Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert
More informationIdentity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu
Identity Access Management IAM 101 Mike Conlon Director of Data Infrastructure mconlon@ufl.edu 1 Three Processes Identity Answers the question Who is in our environment? Authentication Answers the question
More informationWelcome to SharpConnect
Welcome to SharpConnect User Guide for Sharp Health Plan Brokers Version 1.1 www.sharphealthplan.com SharpConnect User Guide for Brokers page 1 TABLE OF CONTENTS Page I. Introduction to SharpConnect...
More informationUser Accounts and Password Standard and Procedure
Office of the Vice President for Operations / CIO User Accounts and Password Standard and Procedure Issue Date: January 1, 2011 Information Security Office Effective Date: November 21, 2014 User Account
More informationIntroduction to Geventis. Registration for the MIN Graduate School (MINGS)
Fakultät für Mathematik, Informatik und Naturwissenschaften Introduction to Geventis Registration for the MIN Graduate School (MINGS) http://www.min.uni-hamburg.de/en/min-graduiertenschule.html Email mings@uni-hamburg.de
More informationOracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10
Oracle Human Capital Management Cloud Release 10 Oracle Human Capital Management Cloud Part Number E61339-03 Copyright 2011-2015, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,
More informationDeficiencies in English or in academic preparation will lengthen your period of study.
INFORMATION FOR USE IN COMPLETING THE FINANCIAL RESOURCES STATEMENT Under the regulations of the U.S. Immigration and Naturalization Service, the University of Michigan is required to obtain proof that
More informationDRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming
More informationWindows 2000 Planning at the University of Michigan
Windows 2000 Planning at the University of Michigan by MaryBeth Stuenkel Dave Detlefs Andrew Wilson (U-M Information Technology Division) 5/16/2000 Presented at the May 2000 Common Solutions Group meeting
More informationWhat is FERPA? This act is enforced by the Family Policy Compliance Office, U.S. Department of Educational, Washington, D.C.
What is FERPA? The Family Educational Rights and Privacy Act of 1974 (FERPA), as amended (also referred to as the Buckley Amendment), is a Federal law designed to protect the confidentiality of a student
More informationPrivacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction
Privacy Policy/Your California Privacy Rights Last Updated: May 28, 2015 Introduction Welcome! TripleFirrre, LLC, dba Just Seconds Apart knows that safeguarding your privacy is serious business. Your privacy
More informationOklahoma State University Policy and Procedures. Red Flags Rules and Identity Theft Prevention
Oklahoma State University Policy and Procedures Rules and Identity Theft Prevention 3-0540 ADMINISTRATION & FINANCE July 2009 Introduction 1.01 Oklahoma State University developed this Identity Theft Prevention
More informationIdentity Management Capabilities Rise in the Cloud
Fischer International Identity Identity Management Made for Higher Education IDENTITY MANAGEMENT CASE STUDY Identity Management Capabilities Rise in the Cloud Maryland Institute College of Art Executive
More informationEmail Encryption at the University of Miami Miller School of Medicine and University of Miami Health System
Email Encryption at the University of Miami Miller School of Medicine and University of Miami Health System Introduction Email encryption is used to protect sensitive content that is sent from the UM Miller
More informationMichigan Student Data System IHE Request for UIC Collection
Michigan Student Data System IHE Request for UIC Collection Navigating the CEPI website Gaining access to the MSDS C3 Overview XML Overview Demonstration Timing Resources and support 1 Navigating the CEPI
More informationThe Simple Steps For On-Line Enrollment
Here is a simple approach to registering for Emeritus College classes on your computer. IMPORTANT: You must have a Student ID number & current semester online enrollment appointment date/time in order
More informationPacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
More informationInteracting with the Shared Services Center (SSC)
Interacting with the Shared Services Center (SSC) Providing a service that contributes to the mission of each unit is the true measure of success for the SSC. -Pamela Gabel, Executive Director 1 University
More informationIdentity Access Management (IAM) FAQs
1. What is the meaning of birthright privileges? A. Once an employee is hired to BU thru SAP (BUworks), they are entitled to the following birthright privileges. BUID BU Login and Kerberos Password Exchange
More informationCommunity College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009
Community College System of New Hampshire Identity Theft Prevention Program Revised 5/4/2009 Program Adoption The Community College System of New Hampshire ( CCSNH ) developed this Identity Theft Prevention
More informationPrinciples FOR. Practice. for Career Services & Employment Professionals
Principles FOR Professional Practice for Career Services & Employment Professionals Principles for Professional Practice For Career Services & Employment Professionals Career services and employment professionals
More informationSchool Building Leader (SBL) or School Building Leader/School District Leader (SDL) Certification Application Instructions for Graduate Candidates*
School Building Leader (SBL) or School Building Leader/School District Leader (SDL) Certification Application Instructions for Graduate Candidates* TEACH System * who have completed one of the Educational
More informationWheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009
Wheaton College Audit Committee Red Flag Identity Theft Prevention Program Meeting of February 20, 2009 Late last year, the Federal Trade Commission (FTC) and Federal banking agencies issued a regulation
More informationPhone Page Web Based Document Delivery
Slide 1 This tutorial will introduce you to the Phone Page web-based document delivery system. Click on the top button to continue with the full tutorial or any of the other buttons to view portions of
More informationUM Virtual Sites. March 11, 2010 by Lillian Chen, Research Specialist, lillianc@umich.edu. University of Michigan Virtual Sites... 1. MFile...
UM Virtual Sites March 11, 2010 by Lillian Chen, Research Specialist, lillianc@umich.edu Table of Contents University of Michigan Virtual Sites... 1 MFile... 5 University of Michigan Virtual Sites http://virtualsites.umich.edu/
More informationINVESTIGATION REPORT 173-2015
Saskatchewan Government Insurance November 12, 2015 Summary: Saskatchewan Government Insurance (SGI) proactively reported to the Office of the Information and Privacy Commissioner (OIPC) that it had received
More informationUniversity of Southern California ivip Guest/Affiliate System
University of Southern California ivip Guest/Affiliate System Online documentation available at: http://www.usc.edu/its/iam/ivip/ Questions about the USC ivip system can be directed to IAM-admin-l@usc.edu.
More informationData Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
More informationQuick Guide to Registering Your Staff
Quick Guide to Registering Your Staff If your program is an EEC-licensed large or small group, school age, or family child care program or if you program is participating in the EEC-sponsored QRIS initiative,
More informationUser Guide. COBRA Employer Manual
Experience Excellence COBRA Manual User Guide COBRA Employer Manual COBRA Responsibilities and Deadlines Under COBRA, specific notices must be provided to covered employees and their families explaining
More informationSingle Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationNYU Tuition Remission Benefit Plan For Dependent Children Undergraduate Degree Programs For Faculty, Administrators, and Professional Research Staff
NYU Tuition Remission Benefit Plan For Dependent Children Undergraduate Degree Programs For Faculty, Administrators, and Professional Research Staff CONTENTS I. Who is Covered Under this Plan?... 3 II.
More informationAUBURN UNIVERSITY. Human Resource Development Policies (Administrative/Professional and University Staff)
7.0 Human Resource Development Policies AUBURN UNIVERSITY Human Resource Development Policies (Administrative/Professional and University Staff) 7.1 Purpose - The interests of the University are best served
More informationSTUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS
STUDENT RECORD POLICY, PROCEDURES AND DEFINITIONS PURPOSE The purpose of establishing this policy is to ensure Virginia Union University s compliance with the Family Educational Rights and Privacy Act
More information1818 ACCess. Student. 1818 ACC vs. AP. 1818.slu.edu. Saint Louis Universty. Welcome to the 1818 Advanced College Credit Program!
SPRING 2015 1818 ACCess ^ Student Welcome to the 1818 Advanced College Credit Program! 1818 Saint Louis Universty Advanced College Credit provides an opportunity for qualified high school juniors and seniors
More informationCanadian Access Federation: Trust Assertion Document (TAD)
Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes
More informationCONSTITUENT RELATIONSHIP MANAGEMENT: PEOPLESOFT CRM 9.1 FOR HIGHER EDUCATION
CONSTITUENT RELATIONSHIP MANAGEMENT: PEOPLESOFT CRM 9.1 FOR HIGHER EDUCATION Colleges and universities continue to experience unprecedented challenges: increased expectations from their constituents for
More informationPreparing to Serve: Online Training Modules
Preparing to Serve: Online Training Modules MASSEN, A. AND KOWALEWSKI, B. (EDS.) COPYRIGHT 2010. WEBER STATE UNIVERSITY PREPARING TO SERVE: ONLINE TRAINING MODULES PROFESSIONALISM CULTURAL SENSITIVITY
More informationCaltech Career Development Center (CDC) On-Campus Recruiting Policies for Recruiters
Caltech Career Development Center (CDC) On-Campus Recruiting Policies for Recruiters Introduction All employment professionals participating in the On-Campus Recruiting Program are required to work within
More informationFERPA and Homelessness A Technical Assistance Tool for NAEHCY Members
NATIONAL ASSOCIATION FOR THE EDUCATION OF HOMELESS CHILDREN Building Futures Through Education AND YOUTH The Family Educational Rights and Privacy Act FERPA and Homelessness A Technical Assistance Tool
More informationINFORMATION TECHNOLOGY RISK MANAGEMENT PLAN
10/25/2012 TECHNOLOGY SERVICES INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN Procedure Name: LIT Risk Management Information Technology Plan ver 2.31.docx Risk Management Plan Issue Date: TBD Procedure Owner:
More informationContents. U-M Flint Campus UHR - Flint 213 University Pavilion 303 E. Kearsley Flint, MI 48502-1950 810-762-3150 8 a.m. to 5 p.m., Monday Friday, EST
Benefits Information The HR/Payroll Service Center can answer many of your benefits questions. Call 734-615-2000 or toll free 1-866-647-7657. Service Center Representatives are available Monday Friday,
More informationHarePoint Workflow Extensions for Office 365. Quick Start Guide
HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of
More informationBanner Self Service for students
Banner Self Service for students revised April 5, 2006 Table of Contents Get Your UNC Charlotte ID Logging in to Self Service Banner Forgot Your Password? Checking Your Holds Checking Your Registration
More informationInitial Teacher Certification Application Instructions for Undergraduate Adolescence Candidates *
Initial Teacher Certification Application Instructions for Undergraduate Adolescence Candidates * TEACH System * who have completed a registered undergraduate initial teacher certification program at St.
More informationIthaca College Web Policy
Ithaca College Web Policy Scope of Policy This policy applies to websites and applications that are owned and operated by, or operated on behalf of, Ithaca College. Purpose of Ithaca College Websites Ithaca
More informationStudent Administration and Scheduling System
for the Student Administration and Scheduling System DHS/FLETC/PIA-002 February 12, 2013 Contact Point William H. Dooley Chief, Office of IT Budget, Policy, & Plans (912) 261-4524 Reviewing Official Jonathan
More informationLaw College Computer and Technology Information
Law College Computer and Technology Information Account Creation All law students, faculty and staff must have a University of Toledo authentication domain (UTAD) computer account. This account will allow
More informationHP Change Configuration and Release Management (CCRM) Solution
HP Change Configuration and Release Management (CCRM) Solution HP Service Manager, HP Release Control, and HP Universal CMDB For the Windows Operating System Software Version: 9.30 Concept Guide Document
More informationIdentity Management System: Architecture
Identity Management System: Architecture Table of Contents 1. Overview and Goals...3 2. Design...4 1. Overview and Goals The Identity Management (IdM) team at UNC Chapel Hill has identified a set of core
More informationDistance Education Policies and Procedures
Distance Education Policies and Procedures These policies and procedures are designed to ensure Clayton State University compliance with Federal Regulations concerning the definition of distance vs. correspondence
More informationCOBRA Participant Guide
COBRA Participant Guide COBRA Participant Guide 1 Table of Contents Introduction........................................... 3 COBRA Checklist........................................ 3 General Timeline
More information