capstone oral presentation
play

Capstone Oral Presentation Data Security Guidelines for Student - PowerPoint PPT Presentation

Western Governors University Capstone Oral Presentation Data Security Guidelines for Student Information Systems Introducing John Escalera B.S. Computer Science Senior Software Engineer and Analyst @ Educational Evaluation Organization


  1. Western Governors University – Capstone Oral Presentation Data Security Guidelines for Student Information Systems

  2. Introducing John Escalera • B.S. Computer Science • Senior Software Engineer and Analyst @ Educational Evaluation Organization • Rogue Statistician • Mobile Application Development Instructor (IOS, Android, Windows Phone)

  3. Project Choice • Project based on personal experience • Federal Law, State Law • HIPAA, FERPA • Initial Project Idea – Scope Issues • Trimming the Project Scope

  4. The Problem • Student Information Gathering • Student Information Security - Myth vs. Fact • Non-Compliance with State and Federal Privacy Laws • Lax policies • Budget Concerns – Staff Certification and Security Focus

  5. The Project • Multiple Revisions • Project Timeline • Phase 1: Auditing • Phase 2: Requirements Gathering • Phase 3: Design and Development • Phase 4: Quality Assurance • Phase 5: Implementation • Phase 6: Quality Assurance • Phase 7: Post-Implementation Support

  6. Special Strategies • Remember the Rogue Statistician – Quantitative Approach • Two levels of Quality Control • Post-Implementation Support – Qualitative Approach • The Extras - Appendices

  7. Milestones • Project Milestones • Follow Up Milestones

  8. Obstacles • Low Response Rate • Disruption to Productivity During Live Trial

  9. Lessons Learned • The Big Picture • Leadership and Professionalism • Security Planning and Management

  10. Lessons (not) Learned • John’s relationship with U.S.C 1030, the FBI, and Cyberlaw. • Cyberlaw, regulations, and compliance • Systems Security

  11. Real World Application • Cyberlaw, regulations, and compliance • Organizational Change • Security Planning and Management • Systems Security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend