Western Governors University – Capstone Oral Presentation Data Security Guidelines for Student Information Systems
Introducing John Escalera • B.S. Computer Science • Senior Software Engineer and Analyst @ Educational Evaluation Organization • Rogue Statistician • Mobile Application Development Instructor (IOS, Android, Windows Phone)
Project Choice • Project based on personal experience • Federal Law, State Law • HIPAA, FERPA • Initial Project Idea – Scope Issues • Trimming the Project Scope
The Problem • Student Information Gathering • Student Information Security - Myth vs. Fact • Non-Compliance with State and Federal Privacy Laws • Lax policies • Budget Concerns – Staff Certification and Security Focus
The Project • Multiple Revisions • Project Timeline • Phase 1: Auditing • Phase 2: Requirements Gathering • Phase 3: Design and Development • Phase 4: Quality Assurance • Phase 5: Implementation • Phase 6: Quality Assurance • Phase 7: Post-Implementation Support
Special Strategies • Remember the Rogue Statistician – Quantitative Approach • Two levels of Quality Control • Post-Implementation Support – Qualitative Approach • The Extras - Appendices
Milestones • Project Milestones • Follow Up Milestones
Obstacles • Low Response Rate • Disruption to Productivity During Live Trial
Lessons Learned • The Big Picture • Leadership and Professionalism • Security Planning and Management
Lessons (not) Learned • John’s relationship with U.S.C 1030, the FBI, and Cyberlaw. • Cyberlaw, regulations, and compliance • Systems Security
Real World Application • Cyberlaw, regulations, and compliance • Organizational Change • Security Planning and Management • Systems Security
Recommend
More recommend