John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.

Slides:



Advertisements
Similar presentations
1 Environmental Information Exchange Network Electronic Submission ofWastewater Discharge Monitoring Reports.
Advertisements

HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
HES Data Management Ari Haukijärvi. Planning of HES Data Management Purpose of the data management The data will be available for analysis The available.
Welcome to eDMR This PowerPoint presentation is designed to show eDMR users how to login and begin using the eDMR system.
Tips to a Successful Monitoring Visit
Introduction to the Wastewater Program’s Electronic Submission of Discharge Monitoring Report (eDMR) Enhancements Wastewater Compliance Evaluation Section.
How to Get Started eDMR Reporting System Florida Department of Environmental Protection (FDEP)
Florida Department of Environmental Protection (FDEP)
Digital Certificate Installation & User Guide For Class-2 Certificates.
1099 Pro, Inc. – Software for Pro Enterprise Edition Features.
Electronic Submission of Medical Documentation (esMD) for Medicare FFS Presentation to HITSC Provenance Workgroup January 16, 2015.
IMAGES OF THE PAST AND FUTURE Donna Calabrese Director, Office of Vital Statistics Center for Health and Environmental Statistics Kansas Department of.
Data Security The Best Data Security In The Industry.
NASFAA 2003: Reconnecting With Students!. 2 eZ-Audit – Electronic Submissions of Financial Statements and Compliance Audits Session #105.
56TH ANNUAL WATER AND WASTEWATER OPERATORS' CONFERENCE April 17, 2013 NetDMR Update Shawn Hokanson SWPB Permit Support Supervisor Cheryl Edwards SWPB NetDMR.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances Michelle Ferritto,
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
What is it and what can it do for me?
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
Applied Cryptography for Network Security
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Chapter 7 Database Auditing Models
Notice of Compliance Audit
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
1 Electronic Filing System United States Patent and Trademark Office.
Chapter 7 Database Auditing Models
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
May 17, 2005 E-sign Web Forms replace Paper Forms Presented by: Bob Schneider Western Washington University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Electronic Products Workshop – 2004 Division of Air Resource Management -DEP.
EDMR Electronic data submittal system Jeffrey A. Ewick, Section Chief Data and Information Services Section Electronic Discharge Monitoring Report.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Human Resources Administration Department of Social Services 1 Eligibility Data and Image Transfer System EDITS November 6, 2008.
The protection of the DB against intentional or unintentional threats using computer-based or non- computer-based controls. Database Security – Part 2.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Where are States Now? Preliminary Legal & Security Survey Results Jim Whitter National Governors’Association Center for Best Practices January 9, 2001.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
DIGITAL SIGNATURE.
2 Session 30 eZ-Audit – Electronic Submissions of Financial Statements and Compliance Audits.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
1 Industrial Waste Data Tracking: Surveys & Other Information Collection Presented by: Melissa Reboul LDEQ Pretreatment MODULE 3.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CABLING SYSTEM WARRANTY REGISTRATION. PURPOSE OF CABLING REGISTRATION.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
STREAMLINING STORM WATER PERMIT IMPLEMENTATION THROUGH USE OF AN INFORMATION MANAGEMENT SYSTEM April 8, 2004 Presented by John W. Hart 30 th Environmental.
Question to Answer? What is eDMR Why eDMR? Who can use eDMR? What are advantages of eDMR? How does eDMR work? How can facilities sign up?
Reliance PPAP Application. Reliance - PPAP The PPAP application is designed to generate and track the entire Purchase Part Approval Process. Reliance.
Maryland Provider Portal Training – Prior Authorization, Concurrent, and 3871B Reviews April 2016.
Postage Statement Wizard Mail.dat Web Services Presented by: (insert name here) The 1, 2, 3 of Electronic Postage Documentation.
Slide 1 Standard Operating Procedures. Slide 2 Goal To review the standard operating procedures Creating the informed consent document Obtaining informed.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Migration to Central Data Exchange (CDX)
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
NetDMR.
A Step by Step Tutorial This PowerPoint presentation is intended to show eDMR users how to login and use the eDMR system.
Welcome to the Electronic Permit Submittal and Processing System (EPSAP) Professional Engineer Submittal Instructions.
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
Electronic Products Workshop Division of Air Resource Management -DEP
NetDMR.
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
Presentation transcript:

John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection Florida’s Electronic Discharge Monitoring Report (EDMR) System Preserving Data Credibility

Present paper based system...  ~4,500 individually permitted wastewater facilities  3 parts to DMRs  Part A, Summary statistics  Part B, Daily Values  Part D, Groundwater wells

... can be burdensome!  Implementation Approach  Specify Functionality  balance technology vs. administrative process  reduce unforeseen risks by keeping control within system  build in administrative controls  enfoTech & Consulting, Inc.

System Description...  Web-enabled “Thin Client” application  X.12 EDI protocol text file  Data encryption during Internet submission  Registered Users with access control via user names and passwords  PIN-based electronic signature for submitters

Registration Process... “Who are you?”  Existing legacy system tracks permittees & “Authorized Representatives”  Notarized Application Forms for:  Permittee request for permit modification & designation of “Viewers” or “Certifiers”  Electronic Signature Agreement for Certifiers

Registration Process... “PINs & Electronic Signatures”  “Electronic Signature Act of 1996,” in Part II, Chapter 282, F.S. (§ , F.S.)  Confidentiality & PIN compromise issues addressed in ESA and minor permit revision  Preliminary (non functional) PIN issued via certified mail in confidential envelope  Certifiers obtain Functioning PIN via system (being built)

EDMR Status “Ready, Set, Verify, Go”  Initial Trial Status  Review period during which paper DMRs are submitted for “verifying” file compatibility & accuracy  Information is not automatically transferred to legacy system  Functions for suspension, etc.  Manual status changes and historical tracking  Automatic after repeated failures in password or PIN entry

Submission Process “Mail that Report”  SSL encrypted connection  Steps  File selection  PIN entry (& verification)  Required Check for Certification Statement  Submit  Enhanced Certification Statement  “Return Receipt” submittal response (being added)

EDMR Submission Logs “While you were submitting...”  EDMR Submission Log  user name, password, PIN  submission date/time for File Selection, Submit, Received, & Acknowledgement Sent.  IP address captured and stored  Checksum

Copy of Record “While you were submitting...”  Copy of Record  X.12 EDMR file  self-monitoring data  limits/requirements  Submission Log (with forensic information)

EDMR Storage and Access “The EDMR Afterlife...”  X.12 EDMR file stored as Binary Large Object in Oracle 8i  Processed for online viewing and data transfer  EDMR Status/error messages and human readable views/download provided  Revisions allowed, but, each submission maintains records of revisions

Database Functionality... “enhancing credibility”  PIN & Password instances encrypted  Database constraints set to “Insert Only” for Key fields  submission file (X.12)  password, PIN, & checksum  rest of Submission Log  Audit Trail feature  records any changes to selected tables/fields

Fundamentals for Credible and Enforceable Data  Authentication  Report Integrity  Nonrepudiation

Authentication Identifying the Submitter  Reliance on Notary laws  Person must be permittee or authorized representative  ESA and Permit confidentiality requirements  Functional PIN issuance procedure  preface to certification statement  forensic data (e.g., IP address)

Report Integrity Securing the Data  During Transmission  SSL and TCP/IP protection during transmission  Capturing Checksum as received  After Receipt  general system security  Department roles  database design (e.g., Insert Only and Audit Trail features)  Permanent Copy of Record

Nonrepudiation Verifying Intent  Design of Submission Steps  Proximity of PIN to Certification statement  Certification statement language  System requires active “check” of Certification statement for each submission to demonstrate intent to be bound by the content of the data  “Data” file includes data & limits

Demonstrating Credibility “The Persuasive Expert”  Well documented system design and operating procedures  Generation of Log Reports  System Access  Electronic Signature  Submission  Record Integrity Report  reproduces copy of record  compares original checksum with current  provides related Audit Trail records

Summary  Credible Data ?  Administrative (procedural) & technological solutions  reduce unforeseen risks  Reasonable to build, implement & maintain  Contacts or questions  