Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Pennsylvania Banner Users Group 2008 Fall Conference Spreadsheet Budgeting.
Pennsylvania BANNER Users Group 2006 NCATE Assessments John Tabor University of Scranton.
Pennsylvania BANNER Users Group 2007 Admissions Checklist – Online!
Pennsylvania Banner Users Group 2008 Fall Conference Imaging in Financial Aid.
Pennsylvania BANNER Users Group 2007
Pennsylvania BANNER Users Group 2007 Structuring a reporting environment for success.
Pennsylvania BANNER Users Group 2007 Successfully Implementing a Decentralized Admissions Solution.
10 th Anniversary Implementing a Dynamic Management Reporting Environment.
Pennsylvania BANNER Users Group 2007 Automating the Freshman Parent Load.
Pennsylvania Banner Users Group 2008 Fall Conference Finance Reporting from the ODS using Cognos.
Importing Data from Banner into the NCAA CAi System
Pennsylvania BANNER Users Group 2007 Oracle Discoverer Web Reports for the Provost & Deans.
Pennsylvania Banner Users Group 2008 Fall Conference EMUR (Enrollment Management Reporting) Portal.
Pennsylvania BANNER Users Group 2006 Disaster Recovery.
Pennsylvania BANNER Users Group 2006 Dickinson College Accounts Receivable Go Live Lessons Learned.
Pennsylvania Banner Users Group 2009 Fall Conference Implementing Imaging 11/24/2009.
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Designated Authority Training Parking & Access Control July 2009.
General Lockdown Procedure
Information Technology Disaster Recovery Awareness Program.
HIPAA Security.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Test Monitor Training Administering Minnesota Assessments “Leading for educational excellence and equity. Every day for every one.”
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Electronic 1098-T Reporting for TouchNet Debra D. Bailey, Accounting Manager, Student Financial Services Michael Fox, University Cashier, Cashier’s Office.
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
RVCC FACULTY FERPA WORKSHOP OCTOBER 2011 DAN PALUBNIAK REGISTRAR
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
HAHP Health & Safety Induction 2014/15
Active Directory Production Pilot Project Department of Administration Enterprise Technology Services (ETS) ETS is a customer based team that provides.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
EMERGENCY EVACUATION TRAINING for BUILDING DIRECTORS Preparation for Fire Evacuation Drills.
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
NC A&T STATE UNIVERSITY
DISA PREPAR JOHN MOHLER UNIVERSITY OF MARYLAND EDNESS STER.
ESCCO Data Security Training David Dixon September 2014.
A Major Business Disruption A Strategy for Minimising the Downtime Anthony Hegarty Mitigating Risks.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Privacy and Information Management ICT Guidelines.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Children’s Hospital Requirements for Remote Access.
Developing Plans and Procedures
1 Spring 2014 EOC Test Security April 3, Assessment Administration 2.
Disaster Recovery 2015 Indiana Statewide Payroll Conference Michael Ievoli-Client Support Specialist IV, Major Accounts September 16, 2015 Copyright ©
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Unit 1 Communication and Employability Skills for IT 1.
Health, Safety and Environment Induction. What you need to do? Complete the Health, Safety and Environment Induction Report (S010F) (this includes all.
EXPECT THE UNEXPECTED Prepare Your Business for Disaster.
Information Management and the Departing Employee.
Devin Budhram Lisa Martinson University of Georgia University Housing Division of Student Affairs.
Introduction Ms. Rivera, Sacko & Gonzalez
Business Continuity Steven S. Keleman, CPM. Emergency Management Prevention Response Preparation Mitigation Recovery.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
TECHNOLOGY’S ROLE in TAX-AIDE
Fire Safety & Disaster Planning
INTRODUCTION TO TAX-AIDE TECHNOLOGY
12 STEPS TO A GDPR AWARE NETWORK
Handling Information Securely
Presentation transcript:

Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment

General Announcements: Please turn off all cell phones/pagers If you must leave the session early, please do so as discreetly as possible Please avoid side conversations during the session Questions will be answered at the end of the session Thank you for your cooperation

What is a Disaster A specific event or series of events that compromises, destroys or renders inaccessible data, credibility, processes or personnel that are needed to perform the immediate duties of an office or individual that cannot be performed by others on campus either due to lack of knowledge, ability or access.

Effected Computer Systems/Data/Processes Staff Students Communications – internal – External

Why Financial Aid Disasters are not entirely technical in nature Financial Aid is vulnerable due to being a public office Tax returns/SSNs No one else on campus knows what you do Enemies

Examples Viral infection closes office for several weeks Fire destroys office Visitor grabs a stack of tax returns off a desk and heads out the door. Pandemic closes school. All lenders need to be contacted and funds returned if appropriate Laptop containing sensitive aid information is stolen Secretary is bringing SSNs home to boyfriend

3 Phases of Disaster Recovery Prevention/Pre-Disaster Containment Recovery

Prevention/ Pre-Disaster Develop a quick and capable response to assure full utilization of all available resources by completing the following: – Document processes and conducting training – Communicate and coordinate disaster recovery plans with IT staff – Developing a procedure for alerting, notifying, and mobilizing key staff members – Establishing mutual support agreements with other offices around campus – Establishing mutual support agreements and contact arrangements with other interested parties (AES, Lenders, etc.) – Make certain staff has a copy of Disaster Plan to refer in case of emergency – Test as much as possible

Containment Its happening. – Protect life – Determine boundaries – Take steps necessary to reduce the level of disaster – Assess immediate dangers of continuance of operation – Communicate with key staff as to implementation of the plan No one will provide information to members of the media.

Recovery The disaster is over or has been contained – How good was your plan? – Was the plan understood and executed? – Communicate return to normalcy with internal and external contacts

Recommendations Form DR committee in Financial Aid – Appoint lead – Invite members of other departments – Write DR manual within committee Everyone gets a copy Everyone is expected to know their part

Recommendations contd Stress Test – Ask staff (especially Work Study) to help identify vulnerabilities – Once a month have an employee work from remote location – Work with IT staff to test data recovery

Recommendations contd Back up! – Verify with IT staff that your data IS being backed up – Purchase zip drive or other external drive to back up important data – Password protect sensitive data – Store back up drives in secure location

Recommendations contd Remove temptation – No files left on desks unattended, especially tax returns, especially overnight – Do not allow passwords to be written down and stored on monitors or keyboards – Do not keep a file called passwords on your pc – Do not travel with sensitive information unless necessary

Recommendations contd Use common sense – Dont sensitive information unless you are certain of the recipient(s) – Dont send prints to public printers – Homing pigeons do not make good curriers – Make sure staff is not giving out information they should not

Discussion