capstone oral presentation
play

Capstone Oral Presentation Data Security Guidelines for Student - PowerPoint PPT Presentation

Western Governors University Capstone Oral Presentation Data Security Guidelines for Student Information Systems Introducing John Escalera B.S. Computer Science Senior Software Engineer and Analyst @ Educational Evaluation Organization


  1. Western Governors University – Capstone Oral Presentation Data Security Guidelines for Student Information Systems

  2. Introducing John Escalera • B.S. Computer Science • Senior Software Engineer and Analyst @ Educational Evaluation Organization • Rogue Statistician • Mobile Application Development Instructor (IOS, Android, Windows Phone)

  3. Project Choice • Project based on personal experience • Federal Law, State Law • HIPAA, FERPA • Initial Project Idea – Scope Issues • Trimming the Project Scope

  4. The Problem • Student Information Gathering • Student Information Security - Myth vs. Fact • Non-Compliance with State and Federal Privacy Laws • Lax policies • Budget Concerns – Staff Certification and Security Focus

  5. The Project • Multiple Revisions • Project Timeline • Phase 1: Auditing • Phase 2: Requirements Gathering • Phase 3: Design and Development • Phase 4: Quality Assurance • Phase 5: Implementation • Phase 6: Quality Assurance • Phase 7: Post-Implementation Support

  6. Special Strategies • Remember the Rogue Statistician – Quantitative Approach • Two levels of Quality Control • Post-Implementation Support – Qualitative Approach • The Extras - Appendices

  7. Milestones • Project Milestones • Follow Up Milestones

  8. Obstacles • Low Response Rate • Disruption to Productivity During Live Trial

  9. Lessons Learned • The Big Picture • Leadership and Professionalism • Security Planning and Management

  10. Lessons (not) Learned • John’s relationship with U.S.C 1030, the FBI, and Cyberlaw. • Cyberlaw, regulations, and compliance • Systems Security

  11. Real World Application • Cyberlaw, regulations, and compliance • Organizational Change • Security Planning and Management • Systems Security

Recommend


More recommend