resource management, data integrity, and computing environment

46
Resource Resource Management, Data Management, Data Integrity, and the Integrity, and the Computing Computing Environment Environment Sandra Featherson Sandra Featherson Office of the Office of the Controller Controller Doug Drury Doug Drury Information Systems Information Systems & Computing & Computing September 13, 2007 September 13, 2007

Upload: khanyasmin

Post on 21-May-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Resource Management, Data Integrity, and Computing Environment

Resource Management, Resource Management, Data Integrity, and the Data Integrity, and the

Computing EnvironmentComputing Environment

Sandra FeathersonSandra FeathersonOffice of the ControllerOffice of the Controller

Doug DruryDoug DruryInformation Systems & Information Systems &

ComputingComputing

September 13, 2007September 13, 2007

Page 2: Resource Management, Data Integrity, and Computing Environment

AgendaAgenda

Computing EnvironmentComputing EnvironmentResource ManagementResource ManagementData IntegrityData Integrity

Page 3: Resource Management, Data Integrity, and Computing Environment

Computing EnvironmentComputing Environment

Maintaining a reliable computing Maintaining a reliable computing environment:environment: Why is this important?Why is this important?

Page 4: Resource Management, Data Integrity, and Computing Environment

Computing EnvironmentComputing Environment

Physical SecurityPhysical SecurityEquipment is properly securedEquipment is properly securedEquipment is maintainedEquipment is maintained

Page 5: Resource Management, Data Integrity, and Computing Environment

Computing EnvironmentComputing Environment

Systems DevelopmentSystems Development IS-10 – UC PolicyIS-10 – UC PolicyEstablish a planEstablish a planWell trained technical professionalsWell trained technical professionals Identify projectsIdentify projectsDefine scope, benefits, risks, priorities, Define scope, benefits, risks, priorities,

timing, and implementation methodtiming, and implementation method

Page 6: Resource Management, Data Integrity, and Computing Environment

Computing EnvironmentComputing Environment

Systems DevelopmentSystems DevelopmentWhat is ‘System Development’?What is ‘System Development’? Impact of the projectImpact of the projectDetermine staffing, equipment, and other Determine staffing, equipment, and other

needsneedsFunding requirements and sourcesFunding requirements and sourcesDocumentation of systemDocumentation of system

Page 7: Resource Management, Data Integrity, and Computing Environment

Computing EnvironmentComputing Environment

Other Things to Think About:Other Things to Think About:Systems ManagementSystems ManagementPassword MaintenancePassword MaintenanceDisaster RecoveryDisaster RecoverySeparating EmployeesSeparating Employees

Page 8: Resource Management, Data Integrity, and Computing Environment

Electronic Personal Information: Electronic Personal Information: What Is It?What Is It?

● SB1386 designed to address SB1386 designed to address identity theftidentity theft– took effect July 1took effect July 1stst, 2003, 2003– added §1798.29, §1798.82 to State Civil Code (Information Practices Act)added §1798.29, §1798.82 to State Civil Code (Information Practices Act)– created disclosure requirements upon a security breach of systems created disclosure requirements upon a security breach of systems

containing “unencrypted” personal informationcontaining “unencrypted” personal information

An individual’s first name or initial and last name in An individual’s first name or initial and last name in combination with one or more of the following:combination with one or more of the following:

Social Security NumberSocial Security Number

Driver’s License NumberDriver’s License Number

Financial account or credit card number in combination with any Financial account or credit card number in combination with any password that would permit access to the individual's accountpassword that would permit access to the individual's account

• See See http://isc.ucsb.edu/decaf/SB1386.pdf for more information for more information

Page 9: Resource Management, Data Integrity, and Computing Environment

Electronic Personal Electronic Personal InformationInformation

UCSB Campus RolesUCSB Campus Roles Data ProprietorData Proprietor - - A personal information data A personal information data

store proprietor is the department director or store proprietor is the department director or senior manager who is the functional owner of senior manager who is the functional owner of the application that is the primary source of the the application that is the primary source of the personal information. It is the responsibility of personal information. It is the responsibility of the data store proprietor to ensure that the the data store proprietor to ensure that the inventory of personal information data stores is inventory of personal information data stores is kept current for the data stores for which the kept current for the data stores for which the proprietor is responsible. proprietor is responsible.

Page 10: Resource Management, Data Integrity, and Computing Environment

Electronic Personal Electronic Personal InformationInformation

UCSB Campus RolesUCSB Campus Roles Data CustodianData Custodian - - A A personal information data personal information data

store custodian is an individual or organization store custodian is an individual or organization that is responsible for providing technical or that is responsible for providing technical or system administration support for the data store. system administration support for the data store. It is the responsibility of the personal information It is the responsibility of the personal information data store custodian to ensure that the data store custodian to ensure that the implementation and administration of the implementation and administration of the personal information data store conforms to IS-3 personal information data store conforms to IS-3 requirements, as a minimum, and to campus and requirements, as a minimum, and to campus and industry best practices for system security where industry best practices for system security where appropriate.appropriate.

Campus Sensitive Data Incident CoordinatorCampus Sensitive Data Incident Coordinator - - Doug Drury [email protected] Drury [email protected]

Page 11: Resource Management, Data Integrity, and Computing Environment

Electronic Personal Information Electronic Personal Information Policy & GuidelinesPolicy & Guidelines

UC Policy IS-3 defines policy regarding UC Policy IS-3 defines policy regarding management of Electronic Personal Information management of Electronic Personal Information (as well as other information system issues) (as well as other information system issues) http://www.ucop.edu/ucophome/policies/bfb/is3.pdf

UCSB Guideline provides process for handling UCSB Guideline provides process for handling exposure of personal information exposure of personal information http://www.oit.ucsb.edu/committees/ITPG/sb1386.asp

Page 12: Resource Management, Data Integrity, and Computing Environment

Electronic Personal Information Electronic Personal Information Best PracticesBest Practices

Don’t Store It Unless Absolutely NecessaryDon’t Store It Unless Absolutely Necessary If You Do Store ItIf You Do Store It

Follow IS-3 PolicyFollow IS-3 Policy Retain contact information for stored individualsRetain contact information for stored individuals Submit Inventory Data To Campus Coordinator (Submit Inventory Data To Campus Coordinator (

[email protected]) Follow Industry Best Practices For System SecurityFollow Industry Best Practices For System Security UC Electronic Communication Policy allows UC UC Electronic Communication Policy allows UC

campuses to encrypt personal information data campuses to encrypt personal information data stores – ENCRYPT IF POSSIBLE stores – ENCRYPT IF POSSIBLE (http://www.ucop.edu/ucophome/coordrev/ucpolicies/policymanuals.html)

Page 13: Resource Management, Data Integrity, and Computing Environment

Electronic Personal InformationElectronic Personal InformationIncident ProcessIncident Process

Incident DetectionIncident Detection Requires active monitoring of data storeRequires active monitoring of data store Requires extensive analysis to determine if a breach Requires extensive analysis to determine if a breach

as occurredas occurred UCSB Guideline provides assessment guidanceUCSB Guideline provides assessment guidance

http://www.oit.ucsb.edu/committees/ITPG/sb1386.asp Incident Handling Process Incident Handling Process

Follow the UCSB Guideline closelyFollow the UCSB Guideline closely Allow appointed UCSB/UC officials to handle any Allow appointed UCSB/UC officials to handle any

communicationcommunication

Page 14: Resource Management, Data Integrity, and Computing Environment

Electronic Personal Information Electronic Personal Information Information SourcesInformation Sources

UC Policy: UC Policy: http://www.ucop.edu/ucophome/policies/bfb/is3.pdf

UCSB Guideline: UCSB Guideline: http://www.oit.ucsb.edu/committees/ITPG/sb1386.asp

California Law: California Law: http://isc.ucsb.edu/decaf/SB1386.pdf

Finally – The UC/UCSB definition of Finally – The UC/UCSB definition of Personal Data is evolving. You will be kept Personal Data is evolving. You will be kept up to date if the definition changesup to date if the definition changes

Page 15: Resource Management, Data Integrity, and Computing Environment

Resource ManagementResource Management

Financial DataFinancial DataValue of BudgetsValue of BudgetsAnalyze Costs, Benefits, and RisksAnalyze Costs, Benefits, and RisksAsset ManagementAsset Management

Page 16: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Financial DataFinancial Data

Verify data is accurate and completeVerify data is accurate and completeCompare GLO60 to any Shadow SystemCompare GLO60 to any Shadow SystemReview significant deviationsReview significant deviationsDocument corrective actionDocument corrective action

Page 17: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Value of BudgetsValue of Budgets

Represents your financial plan for future Represents your financial plan for future periodsperiods

Decisions based on dataDecisions based on dataProper use of resourcesProper use of resourcesValuable controlValuable controlEvaluate resource opportunitiesEvaluate resource opportunities

Page 18: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Value of BudgetsValue of Budgets

Budget for:Budget for:Departmental OperationsDepartmental OperationsEventsEventsProjectsProjects

Page 19: Resource Management, Data Integrity, and Computing Environment

Resource Management andResource Management andSAS 112SAS 112

Department Key ControlsDepartment Key ControlsGL ReconciliationGL ReconciliationReview of Budget ReportsReview of Budget ReportsEquipment InventoryEquipment Inventory

Page 20: Resource Management, Data Integrity, and Computing Environment

Scenario #1Scenario #1

Your department is hosting an international Your department is hosting an international conference. The expected number of conference. The expected number of participants is 250. Pre-registration is participants is 250. Pre-registration is required. The PI, who is the host, believes required. The PI, who is the host, believes $500 is the going rate for conferences. $500 is the going rate for conferences.

In Groups:List the steps you would take to develop the

budget and track expenditures for the conference.

Page 21: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Analyze Costs, Benefits, and Analyze Costs, Benefits, and

RisksRisks

Something sounds like a good idea, Something sounds like a good idea,

but is it?but is it?

Page 22: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Analyze Costs, Benefits, and Analyze Costs, Benefits, and

RisksRisks

Components of AnalysisComponents of AnalysisStatement of PurposeStatement of PurposeStatement of BenefitsStatement of BenefitsAssumptionsAssumptions Impact on administrative supportImpact on administrative support

Page 23: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Analyze Costs, Benefits, and Analyze Costs, Benefits, and

RisksRisks

Components of AnalysisComponents of AnalysisQuantify costs (one time vs. on-going), Quantify costs (one time vs. on-going),

space needs, and capital outlayspace needs, and capital outlayFunding sourcesFunding sourcesPotential risks/problemsPotential risks/problems

Page 24: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Analyze Costs, Benefits, and Analyze Costs, Benefits, and

RisksRisks

Components of AnalysisComponents of AnalysisPerformance follow-upPerformance follow-up

Did cost projections come in on target?Did cost projections come in on target?Did the benefits outweigh the costs?Did the benefits outweigh the costs?Did the results meet expectations?Did the results meet expectations?

Page 25: Resource Management, Data Integrity, and Computing Environment

Scenario #2Scenario #2

Your department wants to purchase new Your department wants to purchase new desktops for the office.desktops for the office.

In Groups:Do a cost-benefit-risk analysis for your

department purchasing the desktops. Present your recommendations to the department.

Page 26: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

CashCashReceivablesReceivablesUniversity Resources/EquipmentUniversity Resources/EquipmentPeoplePeople

Page 27: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

CashCashProper receiving and storingProper receiving and storingProper depositing and recordingProper depositing and recordingReconcile the depositsReconcile the deposits

Page 28: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

Cash Management:Cash Management:

Short Term Investment Pool (STIP)Short Term Investment Pool (STIP)Depository bank accountsDepository bank accountsDisbursement bank accountsDisbursement bank accounts

VendorVendorPayrollPayroll

Balances are invested in STIP dailyBalances are invested in STIP daily

Page 29: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

Cash Management: Cash Management:

Short Term Investment Pool (STIP)Short Term Investment Pool (STIP)Earnings are credited back to the funds Earnings are credited back to the funds

which generated the interestwhich generated the interestThe interest for “campus owned” funds is The interest for “campus owned” funds is

distributed back to the campusdistributed back to the campus

Page 30: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

ReceivablesReceivablesDo you have any?Do you have any?

CollectionsCollectionsMonitor statusMonitor status

Collection AgenciesCollection AgenciesWrite OffWrite Off

If you have receivables, you should be If you have receivables, you should be using the BA/RC processusing the BA/RC process

Page 31: Resource Management, Data Integrity, and Computing Environment

Discussion Item #1Discussion Item #1

Do you have any cash Do you have any cash

management issues?management issues?

Page 32: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

University ResourcesUniversity ResourcesUse of the University SealUse of the University SealUse of the University Name/LogoUse of the University Name/Logo

Page 33: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

Use of the University Name/LogoUse of the University Name/LogoPolicy 5010:Policy 5010:

““Use of the University’s Name”Use of the University’s Name”Use of the University SealUse of the University Seal

Policy 5015:Policy 5015:

““Use of the Unofficial Seal”Use of the Unofficial Seal”

Page 34: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

Campus designees to authorize use of theCampus designees to authorize use of theseal/name/logo are:seal/name/logo are:Meta Clow Meta Clow Jeri Pollard (for commercial products)Jeri Pollard (for commercial products)

Page 35: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

EquipmentEquipmentProper purchasingProper purchasingProper trackingProper tracking

Physical assets are compared to recorded Physical assets are compared to recorded assets and discrepancies are resolvedassets and discrepancies are resolved

Proper disposingProper disposing

Page 36: Resource Management, Data Integrity, and Computing Environment

Resource Management:Resource Management:Asset ManagementAsset Management

People - This is our most important asset!People - This is our most important asset!Proper trainingProper trainingFormal delegationsFormal delegationsCurrent job descriptionsCurrent job descriptionsTimely evaluationsTimely evaluationsConsistent and fair treatmentConsistent and fair treatment

Page 37: Resource Management, Data Integrity, and Computing Environment

Data IntegrityData Integrity

Why do we care? Why do we care?

What could go wrong?What could go wrong?

Page 38: Resource Management, Data Integrity, and Computing Environment

Data IntegrityData Integrity

How do you maintain data integrity?How do you maintain data integrity?Separation of dutiesSeparation of duties

Small departments might need to partner with Small departments might need to partner with other departmentsother departments

Adequate documentation and descriptionAdequate documentation and descriptionWell trained employeesWell trained employees

Page 39: Resource Management, Data Integrity, and Computing Environment

Data IntegrityData Integrity

How do you maintain data integrity?How do you maintain data integrity?Compliance with policies and proceduresCompliance with policies and proceduresCoding Transactions CorrectlyCoding Transactions CorrectlyReconcile departmental reports to the Reconcile departmental reports to the

GLO60GLO60Reconcile the GLO60 on a timely basisReconcile the GLO60 on a timely basisRecord retentionRecord retention

Page 40: Resource Management, Data Integrity, and Computing Environment

Data IntegrityData IntegrityCoding Transactions CorrectlyCoding Transactions Correctly

Types of CostsTypes of Costs DirectDirect IndirectIndirect UnallowableUnallowable

Function of CostFunction of Cost TeachingTeaching ResearchResearch Public ServicePublic Service

Purpose of CostsPurpose of Costs TravelTravel Office SuppliesOffice Supplies ServicesServices

Consistency in treatment Consistency in treatment of costs is a critical of costs is a critical policy for the federal policy for the federal government.government.

Page 41: Resource Management, Data Integrity, and Computing Environment

Discussion Item #2Discussion Item #2

You are given a list of transactions for You are given a list of transactions for today’s activity. today’s activity.

Identify the correct coding forIdentify the correct coding foreach transaction.each transaction.

Page 42: Resource Management, Data Integrity, and Computing Environment

Data Integrity:Data Integrity:Record RetentionRecord Retention

Why is this important?Why is this important? The institution needs to consistently apply a The institution needs to consistently apply a

records management programrecords management program If your practice is to keep everything, you will be If your practice is to keep everything, you will be

expected to produce what is requestedexpected to produce what is requested If you can show that you consistently follow the If you can show that you consistently follow the

record management program, the court will record management program, the court will accept your inability to produce the recordaccept your inability to produce the record

Page 43: Resource Management, Data Integrity, and Computing Environment

Data Integrity:Data Integrity:Record RetentionRecord Retention

How long do we have to keep records?How long do we have to keep records?The UC Records Disposition Schedules The UC Records Disposition Schedules

Manual specifies the length of time Manual specifies the length of time records must be maintained by the office records must be maintained by the office of record and others:of record and others:

http://www.policies.uci.edu/adm/records/721-11a.htmlhttp://www.policies.uci.edu/adm/records/721-11a.html

Page 44: Resource Management, Data Integrity, and Computing Environment

Data Integrity:Data Integrity:Record RetentionRecord Retention

Who is the office of record?Who is the office of record?The office of record is the office The office of record is the office

responsible for retaining the original responsible for retaining the original record, and for producing a requested record, and for producing a requested recordrecord

Page 45: Resource Management, Data Integrity, and Computing Environment

Data Integrity:Data Integrity:Record RetentionRecord Retention

Who do you call if you have questions?Who do you call if you have questions?Meta Clow, the Campus Policy and Meta Clow, the Campus Policy and

Records Management Coordinator:Records Management Coordinator:[email protected]@vcadmin.ucsb.edu

Page 46: Resource Management, Data Integrity, and Computing Environment

Questions?Questions?