Year of entry into provider (last 2 digits of year) Next 4 digits: HESA institution identifier
|
|
- Gervais Bryant
- 5 years ago
- Views:
Transcription
1 DATA FUTURES APPROACH TO IDENTIFYING STUDENTS To support the collection of quality and usable data resulting in the collation of sector level datasets, HESA has a requirement to identify unique students and their engagements. Part of this requirement extends to identifying where people have multiple interactions with Higher Education, to ensure continuity of data over time. HESA has an obligation to minimise the burden resulting from this requirement, and where possible looks to avoid introducing artificial data into the system. Within the current student data collections there are two keys that exist to serve this requirement HESA Unique Student Identifier (HUSID) and the Student Instance Identifier (NUMHUS), and this paper sets out HESA s intended approach to replicating and enhancing this functionality as part of the Data Futures Platform. IDENTIFYING STUDENTS For the current Student, ITT, and AP records, HESA uses the HUSID to uniquely identify a student. This identifier is generated for all students, and the provider is responsible for returning a HUSID to HESA, being either one that has been previously allocated or by generating a new one. Given the need to make this globally unique, HESA currently requires HUSIDs to adhere to the structure below, which is taken from the current student coding manual: First 2 digits: Year of entry into provider (last 2 digits of year) Next 4 digits: HESA institution identifier Next 6 digits: Last digit: 6-digit reference number internally allocated by provider Check digit The resultant value is then used to enable linking of data across providers and through time. It is important to note that the Student entity in the Data Futures model serves a slightly different function to the current models, and is really representing an individual and their relationship with a specific provider. That is to say, all of their interactions over time with one provider would be associated with a single student entity within the database, whereas the same person at two different providers will be represented by two student entities within the same database. In practice this means that in the Data Futures model the HUSID becomes the primary key for students for a provider. As Data Futures is built on the principle of collecting data once, for all future interactions that provider would not need to return a new student entity, but simply link to the one already present. As HESA s requirement is primarily to link individuals to their relevant student identities over time, the focus of this activity becomes identifying the same person at different providers rather Page 1 of 5
2 than individuals who return to the same provider (as this simply extends the data already known about that student). As the HUSID is the primary key (PK) for a student at a provider, and the same person can interact with more than one provider, then the HUSID cannot be the mechanism for linking students across providers. This is because as a globally unique primary key the HUSID must be a different identifier for the individual at each provider they interact with. THE DATA FUTURES PROPOSAL To solve this issue, the first time a student is returned to HESA the HUSID supplied would become the persistent HUSID for that student. This is expected to be achieved through a derived field, to tie together current and all future HE interactions they may have. The persistent HUSID would then need to be returned by any provider with whom the student subsequently has an engagement. Note that an individual student could therefore have several HUSIDs assigned; one per provider with whom they have interacted, and these would be linked together through a single persistent HUSID. In the event of a student commencing studies at two or more providers around the same time, the one with the earliest Registration start date would be the one from which the persistent HUSID would be derived. In broad terms the current HUSID becomes the equivalent of the Persistent HUSID. The HUSID as it is currently known would be replaced by the Student Identifier (SID), which would be managed by the provider in much the same way as HUSID is now. The change of name for HUSID to SID here is to acknowledge the shift in purpose of this field, from global identifier to provider specific one. It is HESA s intention to no longer use the current HESA institution identifier but instead use the UK Provider Reference Number (UKPRN). The provider will need to supply the UKPRN as part of the SID to enable identification of the submitting provider. The Persistent HUSID itself cannot be used as a primary key by HESA as it is by definition not globally unique (given that a student would have the same number allocated at each provider they attend), and as it may not be possible for providers to always know if a student has received a persistent HUSID from another provider before they return registration details, not a viable option for providers to use this value as a primary key either. SID would therefore be comprised of: First 2 digits: Next 8 digits: Next 6 digits: Last digit: Year of entry into provider (last 2 digits of year) UKPRN 6-digit reference number internally allocated by provider Check digit Page 2 of 5
3 The SID would be returned by the provider and remains with the student throughout any interactions with the provider; effectively acting as the primary key for a provider to interact with HESA about a specific person. As the primary key for the student table the SID would be a globally unique value, allowing multiple providers to submit data about the same person, without HESA experiencing potential data protection or integrity issues. A lookup service would be available to aid providers in identifying any previous SID that the student has been allocated, which would then be submitted as part of their return as a personal identifier of type <persistent HUSID>. The provision of this data enables HESA to link people across providers more accurately whilst allowing providers freedom to engage with HESA using an identifier they have generated. A student that is returned to HESA would be expected to contain the following: - SID, calculated by provider based on HESA specified rules. Acts a primary key for that student for both the provider and for HESA - Provider s own identifier for student (OWNSTU), optionally to allow improved data integration back to the Providers own systems - Persistent HUSID = previous <PK> supplied by another provider where applicable - Any other student identifiers that are relevant / known by the provider for the purposes of identification and data linking Note that OWNSTU cannot reliably be used as part of this unique identifier; as current behaviour leads to changes within OWNSTU across years within an engagement, as well as duplication across students. It is therefore necessary to adopt a HESA-defined key. DATA MIGRATION AND CONTINUING STUDENTS For the migration of legacy data into the HESA data platform, it will be necessary to populate all completed and continuing students current <legacy> HUSID values, as the new SID in order to maintain continuity of these students as they pass through the system (however, it is not expected that any new legacy HUSIDs would be minted once this platform is live). Ideally all linking would be done through the supply of Persistent HUSIDs, however it may be necessary as a transition step to allow providers to submit legacy HUSIDs as part of their submissions, for students who have been allocated a HUSID with that provider. The full details of how to manage the migration of this data, and the transition period will be defined by HESA with input from stakeholders through the Alpha and Beta pilots. There is a question around how students with a HUSID but interactions with more than one provider will be catered for, and this will be considered as part of the Alpha and Beta pilot phases. When returning a student, the provider must supply HESA with the SID, and where it exists and can be identified the persistent HUSID. Page 3 of 5
4 The first provider to return this person would not need to return the same identifier as both the SID and the Persistent HUSID within the file, but would just need to supply the SID Where a provider latterly becomes aware that a student has a persistent HUSID, this can be submitted as new personal identifier data for the existing student. Where a SID is used in error the recourse would be to delete that student record and resubmit with the correct SID, as this is the primary key and cannot be changed. THE ENGAGEMENT ENTITY The current approximation within the existing collections is NUMHUS. There is a need to uniquely identify a specific engagement within the system. NUMHUS is unique for each Student (meaning a student can only use a given NUMHUS once, irrespective of how many engagements they have whilst several students can share the same NUMHUS). This is a 20-character identifier specified by the provider. The creation and population of these identifiers can continue to be generated in the same way and will continue to be called NUMHUS. HESA will take this supplied value and concatenate this with the SID of the relevant student to generate the primary key (EngagementID). This value will also be used to validate the collection of collaborative provision, where the receiving partner will need to return the EngagmentID that has been created to identify the relevant engagement at the other partner. MIGRATED DATA AND CONTINUING STUDENTS It will be necessary to carry over any allocated NUMHUS and assign them to the relevant engagements / and or registrations for both continuing students and those who have completed, as well as using them to pre-populate the EngagementID value by combining it with the SID (although it may be prudent to prefix them to ensure future uniqueness). It would be expected that any new engagements for existing students would need to have a new NUMHUS supplied, although it will be necessary to allow already allocated NUMHUS to be supplied for continuing students where necessary. The migration activity, and future allocations will need to take care to avoid issuing previously allocated NUMHUS values. When returning an engagement to HESA the provider will have to return the NUMHS and the SID. THE STUDENT REGISTRATION ENTITY This will need to be unique within an engagement and does not have an analogous value in the current student returns. HESA proposes to adopt a provider specified field, called NUMREG that is a 4-character field and unique to that specific engagement. Page 4 of 5
5 The globally unique identifier for a particular registration is comprised of the NUMREG, the NUMHUS and the SID. MIGRATED DATA AND CONTINUING STUDENTS As there is no equivalent in the existing data the options HESA has are to either default registrations to a value (which will then need to be known by the provider), or to ask providers to submit appropriate values to be used. These options will be discussed and tested through the alpha and Beta pilot phases. Whilst it expected that in general migration will result in one registration per engagement, there may some specific cases that require attention as result of the NUMHUS mapping question above. When returning a Registration; or any of its child entities such as Student Course Session, the provider will need to return the NUMREG, the NUMHUS, and the SID. Where a NUMREG is returned in error the appropriate response would be to delete that registration record and all its child records, and resubmit with the correct NUMREG. QUESTIONS AND FEEDBACK This document outlines the intended approach to be taken by Data Futures, however there are a number of questions to which HESA would like to hear stakeholder's opinions, so that this approach can be refined and improved through delivery. Specifically: - Should this identifier be called the SID, or retain the title of HUSID? - HESA has a preference for allowing providers to supply their own keys where practical, and would welcome conversation about whether use of a provider-defined SID could be generated instead of using the HESA specified structure above. - Under what conditions (if any) could there be an issue in retaining the SID over time for an individual across multiple (non-contiguous) engagements? This does not change system behaviour, but is important in consistent application and student counts - What services would providers like to see in supporting provision of persistent HUSIDs? For example, reports that flag up students who are likely to have a persistent HUSID. - HESA would also like feedback on the benefits or otherwise of not supplying the UKPRN as part of the Student identifier. Would it be preferable for providers to return a SID incorporating the UKPRN, in effect replicating the structure of the current HUSID? Any further questions or feedback on the viability of this approach, and the implications for providers is welcomed at liaison@hesa.ac.uk please specify Data Futures approach to identifying students: feedback in the subject line, as this will help the team filing the feedback. Page 5 of 5
Policy on Privacy and Management of Personal Information
Policy on Privacy and Management of Personal Information Purpose The purpose of this privacy policy is to: clearly communicate how SMA manages personal information; provide students, members, staff and
More informationCURRICULUM: 1-YEAR POSTGRADUATE CERTIFICATE IN EDUCATION LEADING TO QTS- ENGLISH PROVIDER
DATA FUTURES ALPHA PILOT SCENARIOS CURRICULUM: 1-YEAR POSTGRADUATE CERTIFICATE IN EDUCATION LEADING TO QTS- ENGLISH PROVIDER Curriculum data consists of Qualifications, Courses and Modules. Before students
More informationRobin Wilson Director. Digital Identifiers Metadata Services
Robin Wilson Director Digital Identifiers Metadata Services Report Digital Object Identifiers for Publishing and the e-learning Community CONTEXT elearning the the Publishing Challenge elearning the the
More informationERP/CRM System Implementation Methodology
ERP/CRM System Implementation Methodology Prepared by Admiral Consulting Group Date Submitted May 27, 2016 TABLE OF CONTENTS Implementation Methodology... 3 1.1. Analysis (Solution Envisioning) Phase...
More informationPOSTGRADUATE CERTIFICATE IN LEARNING & TEACHING - REGULATIONS
POSTGRADUATE CERTIFICATE IN LEARNING & TEACHING - REGULATIONS 1. The Postgraduate Certificate in Learning and Teaching (CILT) henceforth the Course - comprises two modules: an Introductory Certificate
More informationNIS Directive : Call for Proposals
National Cyber Security Centre, in Collaboration with the Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Summary NIS Directive : Call for Proposals Closing date: Friday
More informationUnique Object Identifiers
TM dnf0011 Unique Object Identifiers Component 2.1: Identifier Management Technical Guide Version 1 Unique Object Identifiers Page 1 of 6 Document Content Jonathan Simmons is responsible for the content
More informationN4 Design Options. Andy McAnaney DHID VDNS (Voice and Data Networks Services) Team
N4 Design Options N3-JANET gateway N3/N4 high level statements N4 Progress N4 - Achievements to date N4 Key Programme Milestones N4 Engagement Design diagrams Andy McAnaney DHID VDNS (Voice and Data Networks
More informationMultiple Choice Questions
Chapter 15 System Implementation 331 Chapter 15 System Implementation Multiple Choice Questions 1. After maintenance, which of the following is the most expensive and most time consuming phase of the entire
More informationOCM ACADEMIC SERVICES PROJECT INITIATION DOCUMENT. Project Title: Online Coursework Management
OCM-12-025 ACADEMIC SERVICES PROJECT INITIATION DOCUMENT Project Title: Online Coursework Management Change Record Date Author Version Change Reference March 2012 Sue Milward v1 Initial draft April 2012
More informationCOSO 2013: Implementing the Framework
COSO 2013: Implementing the Framework The COSO Internal Control Integrated Framework is the original framework that has gained broad acceptance and is widely used around the world. In the 20 years since
More informationUKEF UK Export Finance. Transformation with the Microsoft Cloud
UKEF UK Export Finance Transformation with the Microsoft Cloud the customer overview Customer UKEF Website www.gov.uk/uk-export-finance Number of employees UKEF s fixed deadline had major financial implications,
More informationApplication form guidance
Efficiency Research Programme 2018 This guidance document is to be read alongside the application form on AIMS in order to help applicants complete the form correctly. Please ensure that you have read
More informationINVITATION TO TENDER. Website Specification for Herefordshire & Worcestershire Chamber of Commerce. Date: 18/07/2017 Version 1.0
INVITATION TO TENDER Website Specification for Herefordshire & Worcestershire Chamber of Commerce Date: 18/07/2017 Version 1.0 1 Executive Summary This document is an Invitation to Tender (ITT) for the
More informationQUESTIONS AND ANSWERS PROJECT NO Supply and Install Student System. Houston Community College System, Procurement Operations
QUESTIONS AND ANSWERS PROJECT NO. 06-22 Supply and Install Student Email System Date: March 21, 2006 To: From: All Prospective Respondents Houston Community College System, Procurement Operations Subject:
More informationNDIS Quality and Safeguards Commission. Incident Management System Guidance
NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the
More informationParticipant Packet. Quality Attributes Workshop. Bates College Integrated Knowledge Environment
Quality Attributes Workshop Bates College Integrated Knowledge Environment Revision: 6 Page 1 of 5 PROJECT OVERVIEW: The project seeks to design a software architecture to support an integrated knowledge
More information365 Notify User Guide. 365 Mechanix Pty Ltd
365 Notify User Guide About 365 Notify How it works 365 Notify is a Dynamics 365 add-on which delivers notifications to users, contacts, accounts or any other records based on your business needs and activity
More informationBT s response to Ofcom Call for Input. Location information for emergency calls from mobile phones
23 December 2013 BT s response to Ofcom Call for Input Location information for emergency calls from mobile phones Page 1 of 6 Executive Summary Scope: BT agrees that the focus of Ofcom s review should
More informationC519:2004 End to End Network Performance for the STS
C519:2004 End to End Network Performance for the STS We thank Communications Alliance for the opportunity to provide feedback on the End to End Network Performance for the Standard Telephone Service Code
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationCOCKPIT FP Citizens Collaboration and Co-Creation in Public Service Delivery. Deliverable D2.4.1
: 0.3, Date: 31/05/2012 COCKPIT FP7-248222 Citizens Collaboration and Co-Creation in Public Service Delivery Deliverable D2.4.1 Citizens Deliberative Engagement Platform 2 nd Editor(s): Responsible Partner:
More informationArchitectural Blueprint
IMPORTANT NOTICE TO STUDENTS These slides are NOT to be used as a replacement for student notes. These slides are sometimes vague and incomplete on purpose to spark a class discussion Architectural Blueprint
More informationSDP TOOLKIT FOR EFFECTIVE DATA USE
AN INTRODUCTION TO THE SDP TOOLKIT FOR EFFECTIVE DATA USE A GUIDE FOR CONDUCTING DATA ANALYSIS IN EDUCATION AGENCIES www.gse.harvard.edu/sdp/toolkit Toolkit Documents An Introduction to the SDP Toolkit
More informationIFS INTERNET SUPPORT CENTER
IFS INTERNET SUPPORT CENTER REGISTRATION, INSTRUCTIONS AND USER GUIDE Contents REGISTRATION, INSTRUCTIONS AND USER Guide... 1 01 - Introduction... 6 Purpose... 6 Available Services... 6 Registered User
More informationWhat we really mean when we talk about verification
What we really mean when we talk about verification July 2018 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Beneficial ownership does not
More informationWelcome to the NHSmail Skype for Business webinar
Welcome to the NHSmail Skype for Business webinar The webinar will begin shortly. Please synchronise your web and phone presence by inputting your Attendee ID into the phone Participant lines will be muted
More informationPORTAL TRANSITION GUIDE. 1 February 2019
PORTAL TRANSITION GUIDE 1 February 2019 PORTAL TRANSITION GUIDE Portal Transition Guide - 1 February 2019 1 WELCOME The Pharmacy Programs Administrator welcomes you to the new Registration and Claiming
More informationIBM TPF Toolkit VisualAge TPF
IBM TPF Toolkit VisualAge TPF Mary Huang Any references to future plans are for planning purposes only. IBM reserves the right to change those plans at its discretion. Any reliance on such a disclosure
More informationCouncil, 26 March Information Technology Report. Executive summary and recommendations. Introduction
Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last
More informationIntroduction 1. This policy applies, irrespective of length of service or duration of contract to:
Data Disclosure Control Policy Introduction 1. This policy applies, irrespective of length of service or duration of contract to: employees of HEFCW temporary or contract staff engaged by HEFCW, including
More informationLoan Closing Advisor SM. User Guide. December 2017
Loan Closing Advisor SM User Guide December 2017 Notice This User Guide is Freddie Mac s CONFIDENTIAL INFORMATION as defined in and subject to the provisions of the Freddie Mac Single Family Seller/Servicer
More informationSTATS DC A key connection: Stakeholder Engagement and Governance Across Sectors to use Early Childhood Data. July 17 th, 2013
STATS DC A key connection: Stakeholder Engagement and Governance Across Sectors to use Early Childhood Data July 17 th, 2013 1 Welcome! Melissa Beard Data Governance Coordinator, Education Research and
More informationNumber Portability Testing Specifications Manual
Number Portability Testing Specifications Manual Published: 4 th November 2014 Internal Reference: MCA-OPS/ds/14-2022 Malta Communications Authority Valletta Waterfront, Pinto Wharf, Floriana, FRN 1913,
More informationPolicy & Procedure Privacy Policy
NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:
More informationBUSINESS JUSTIFICATION. Name of the request: Securities Transaction Regulatory Reporting
BUSINESS JUSTIFICATION FOR THE DEVELOPMENT OF NEW UNIFI (ISO 20022) FINANCIAL REPOSITORY ITEMS Name of the request: Securities Transaction Regulatory Reporting Submitting organization: SWIFT scrl Avenue
More informationfalanx Cyber ISO 27001: How and why your organisation should get certified
falanx Cyber ISO 27001: How and why your organisation should get certified Contents What is ISO 27001? 3 What does it cover? 3 Why should your organisation get certified? 4 Cost-effective security management
More informationEstablishing high stakes computerbased testing through. Blackboard: challenges & lessons learned
2016 Durham Blackboard Users Conference: Learning from Failure 7th 8th January 2016 Establishing high stakes computerbased testing through Blackboard: challenges & lessons learned Richard Walker & Andy
More informationResponding to a BT Sourcing Activity on Oracle via isupplier
Responding to a BT Sourcing Activity on Oracle via isupplier A users guide for Suppliers responding to an RFI, RFP, RFQ, Auction, ITT or Tender electronically with BT using our new Oracle ebusiness Suite
More informationThe EOIS-CaMS User Guide for New Staff
The EOIS-CaMS User Guide for New Staff CAMBRIAN COLLEGE This Employment Ontario project, program or service is funded by the Ontario government. 2016 The EOIS-CaMS User Guide for New Staff Disclaimer:
More informationICAEW REPRESENTATION 68/16
ICAEW REPRESENTATION 68/16 Improving the Structure of the Code of Ethics for Professional Accountants - Phase 1 ICAEW welcomes the opportunity to comment on the Improving the Structure of the Code of Ethics
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationWebsite Services Update Branches Convention October Carl Harris MBCS CITP Head of Website Services
Website Services Update Branches Convention October 2010 Carl Harris MBCS CITP Head of Website Services High priority projects Increase the priority and positioning of some sections and BCS activities
More informationStreamline SDTM Development and QC
Paper SI09 Streamline SDTM Development and QC Stephen Gormley, Amgen, United Kingdom ABSTRACT Amgen s Global Statistical Programming ( GSP ) function have one centralised team (The CDISC Consultancy and
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationSubcontracted Delivery Policy
Subcontracted Delivery Policy Main points of policy 1. Background to the policy 2. Scope of the Policy 3. Policy Statement 4. Reasons for subcontracting 5. BCA contribution to improving own and subcontractor
More informationSERVICE DESCRIPTION. Population Register Centre s online services
SERVICE DESCRIPTION Population Register Centre s online services SERVICE DESCRIPTION [Number] 2 (12) DOCUMENT MANAGEMENT Owner Author Checked by Approved by Pauli Pekkanen Project Working Group Reko-Aleksi
More informationUniversity of British Columbia Library. Persistent Digital Collections Implementation Plan. Final project report Summary version
University of British Columbia Library Persistent Digital Collections Implementation Plan Final project report Summary version May 16, 2012 Prepared by 1. Introduction In 2011 Artefactual Systems Inc.
More informationSubmitting an Estimate Claim Via the Synergy FIS Provider Portal. Guidance for Free Early Education Providers
Children Young People and Education Directorate Submitting an Estimate Claim Via the FIS Provider Portal Guidance for Free Early Education Providers Page 1 of 8 Contents Introduction... 3 Accessing the
More informationPBS_EquipTrack. Proposal to: Barcode Direct
Proposal to: Barcode Direct By 1. Executive Summary Barcode Direct (BCD) are a supplier and reseller of PDA hardware, software, printers and printer consumables. ProBuild are a broad based construction
More informationEnsuring Compliance with Data Privacy Directives using Virtual Databases
Ensuring Compliance with Data Privacy Directives using Virtual Databases June 2017 Steve Karam, Director of Customer Education and Experience at Delphix Agenda 1 2 3 Ensure compliance to disparate data
More informationFrequently Asked Questions (FAQs) for Trainer
Frequently Asked Questions (FAQs) for Trainer 1 What is a Training of Trainers program (ToT)? Training of Trainers (ToT) is a program for the development of training delivery skills of those who wish to
More informationYes. [No Response] General Questions
General Questions Q1. Do you agree that the proposals to refine the WHOIS opt-out eligibility and to provide a framework for registrar privacy services meets the policy objectives set out in the consultation
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More informationHelp for Suppliers. (UK Public Sector)
Help for Suppliers (UK Public Sector) Version 12.3 Copyright BravoSolution 2011, All Rights Reserved HELP FOR SUPPLIERS... 1 (UK PUBLIC SECTOR)... 1 HELP FOR SUPPLIERS (UK PUBLIC SECTOR)... 8 DASHBOARD
More informationService Description: CNS Federal High Touch Technical Support
Page 1 of 1 Service Description: CNS Federal High Touch Technical Support This service description ( Service Description ) describes Cisco s Federal High Touch Technical support (CNS-HTTS), a tier 2 in
More informationFUNDING FORM NAVIGATION INITIATOR S GUIDE
FUNDING FORM NAVIGATION INITIATOR S GUIDE TABLE OF CONTENTS INTRODUCTION... 1 ACCESS FUNDING FORM IN PEOPLESOFT HR... 2 INITIATE A FUNDING FORM... 2 ENTERING SEARCH CRITERIA TO START FORM... 3 FUNDING
More informationRed Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization
Forrester Total Economic Impact Study Commissioned by Red Hat January 2017 Red Hat Virtualization Increases Efficiency And Cost Effectiveness Of Virtualization Technology organizations are rapidly seeking
More informationNext Generation Strategy
Realising the Benefits of Next Generation Access for Northamptonshire Superfast Northamptonshire: Next Generation Strategy Executive Summary Extending access to superfast broadband - A Consultation Contents
More informationManchester Metropolitan University Information Security Strategy
Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History
More informationFirst Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh.
First Session of the Asia Pacific Information Superhighway Steering Committee, 1 2 November 2017, Dhaka, Bangladesh. DRAFT SUBMISSION OF [ORGANIZATION] PROJECTS/ACTIVITIES/STUDIES [Date] Objective: This
More informationRESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection
402 Res. 179 RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution
More informationCERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION
CERTIFICATION BODY (CB) APPROVAL REQUIREMENTS FOR THE IFFO RESPONSIBLE SUPPLY (IFFO RS) AUDITS AND CERTIFICATION Introduction The IFFO RS Certification Programme is a third party, independent and accredited
More informationSWIFT Response to the Committee on Payments and Market Infrastructures discussion note:
SWIFT Response to the Committee on Payments and Market Infrastructures discussion note: Reducing the risk of wholesale payments fraud related to endpoint security 28 November 2017 SWIFT thanks the Committee
More informationRESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection
RESOLUTION 179 (REV. BUSAN, 2014) ITU's role in child online protection The Plenipotentiary Conference of the International Telecommunication Union (Busan, 2014), recognizing a) Resolution 67 (Rev. Dubai,
More informationPrivacy Policy May 2018
Privacy Policy May 2018 Laser Surveys Ltd T/A Open Space Rooms Laser Surveys operates a privacy first approach to all our business activities and will only require the minimum information to perform our
More informationStandard Operating Procedure. Data Collection and Validation. Public
Scope Special Requirements Process for receiving scientific data collections through the Data Collection Framework and for including data into the EFSA Scientific Data Warehouse. This procedure is a controlled
More informationDRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).
Harvard University Library Office for Information Systems DRS Policy Guide This Guide defines the policies associated with the Harvard Library Digital Repository Service (DRS) and is intended for Harvard
More informationICIS PROJECT #2 CONNECTING SPECIFICATIONS AND BIM SUB-PROJECT #2
ICIS PROJECT #2 CONNECTING SPECIFICATIONS AND BIM SUB-PROJECT #2 ISSUE VERSION: V1.1 DATE: January 2014 PROJECT TEAM: Leader: Richard Choy (NATSPEC) Task Team: Rolf Huber (CIL) Sato Takayoshi (IIBH) Technical
More informationService Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE)
Page 1 of 9 Service Description: Advanced Services Fixed Price Cisco WebEx Advise and Implement Service (0-5,000 Users) (ASF- WBXS-UC-PDIBSE) This document describes Advanced Services Fixed Price Cisco
More informationPlanning and Administering SharePoint 2016
Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the
More informationArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan. This course covers all learning materials for ArchiMate v3
ArchiMate 3 Practitioner (Level 1 & 2) Lesson Plan This course covers all learning materials for ArchiMate v3 Delivery: e-learning Certificate: Examination (included) Accredited by: The Open Group Mock
More informationAdditional Functions User Guide
Additional Functions User Guide Date: April, 2016 Lenovo Warranty Claims User Guide 1 Index Overview... 3 User Preparation... 3 Log In... 3 Password Formats... 4 Welcome Page... 4 Warranty Lookup... 5
More informationChecklist and guidance for a Data Management Plan, v1.0
Checklist and guidance for a Data Management Plan, v1.0 Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan, v1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
More informationSimplifying IT through Virtualization
E X E C U T I V E S U M M A R Y G E T T E C H N O L O G Y R I G H T C U S T O M P U B L I S H I N G Microsoft-powered virtualization offers tremendous potential to help IT executives drive innovation while
More informationSupport notes (Issue 1) September 2018
Support notes (Issue 1) September 2018 Pearson Edexcel Level 2 Certificate/Diploma in Digital Applications (DA202) Unit 2: Creative Multimedia ONCE UPON A TIME Key points for this Summative Project Brief
More informationANZPAA National Institute of Forensic Science BUSINESS PLAN
ANZPAA National Institute of Forensic Science BUSINESS PLAN 2018 19 OUR STRATEGIC INTENT PROMOTE AND FACILITATE EXCELLENCE IN FORENSIC SCIENCE The National Institute of Forensic Science is a directorate
More informationAlpha Kappa Alpha Sorority Users Guide for Chapter Officers ESP Program Reporting and Resources System
Page 1 The main menu of the contains an introduction to the site with general instructions on entering and printing summary reports of ESP program activities, as well as instructions on how to access ESP
More informationThe website. Use of cookies. Introduction
Privacy Policy Introduction This policy sets out the different areas where user privacy is concerned and outlines the obligations & requirements of the users, the website and website owners. Furthermore,
More informationINFORMATION TECHNOLOGY ONE-YEAR PLAN
INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by
More informationGLOBAL DATA SYNCHRONIZATION NETWORK (GDSN) AUTOMATED REQUISITION TRACKING MANAGEMENT INFORMATION SYSTEM (ARTMIS) INTEGRATION RECOMMENDATION REPORT
USAID GLOBAL HEALTH SUPPLY CHAIN PROGRAM PR O CURE ME NT AND S UPPLY MANAGEMENT GLOBAL DATA SYNCHRONIZATION NETWORK (GDSN) AUTOMATED REQUISITION TRACKING MANAGEMENT INFORMATION SYSTEM (ARTMIS) INTEGRATION
More informationEPA Near-port Community Capacity Building: Tools and Technical Assistance for Collaborative Solutions
EPA Near-port Community Capacity Building: Tools and Technical Assistance for Collaborative Solutions Sabrina Johnson, Project Lead EPA Office of Transportation & Air Quality presented at Southeast Diesel
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More information31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation
31 Examples of how Microsoft Dynamics 365 Integrates with Marketing Automation Manage Email Campaigns In-House 1. Quickly Design Emails Save time creating marketing emails using drag and drop template
More informationThe IDN Variant TLD Program: Updated Program Plan 23 August 2012
The IDN Variant TLD Program: Updated Program Plan 23 August 2012 Table of Contents Project Background... 2 The IDN Variant TLD Program... 2 Revised Program Plan, Projects and Timeline:... 3 Communication
More informationSTATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE
STATE BROADBAND ACTION PLAN MAY 2015 Nevada Economic Development Conference PREPARED BY CONNECT NEVADA AND THE NEVADA BROADBAND TASK FORCE PLAN STRUCTURE I INTRODUCTION Background History of the Project
More informationCollaboration & Commitment
Collaboration & Commitment The keys to successful delivery of IDM at the University of Greenwich Joshua Fry Head of Infrastructure Information & Library Services j.fry@gre.ac.uk Past Present & Future The
More informationCommercial transformation, procurement and R&D
Commercial transformation, procurement and R&D Purpose For discussion and direction. Summary As part of the fire reform agenda the Home Office is keen for the fire and rescue sector to deliver greater
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 20339-2; 5 Days; Instructor-led Course Description This five-day course will teach you how to plan, configure, and manage the advanced features in a SharePoint
More informationPROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.
PROGRAMME SPECIFICATION MSc Real Estate Investment KEY FACTS Programme name Real Estate Investment Award MSc School Cass Business School Department or equivalent Specialist Masters Programme Programme
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 Course 20339-2A 5 Days Instructor-led, Hands on Course Information This five-day course will teach you how to plan, configure, and manage the advanced features
More informationOPEN Networks - Future Worlds Consultation
ENA Open Networks Future Worlds Consultation OPEN Networks - Future Worlds Consultation Developing change options to facilitate energy decarbonisation, digitisation and decentralisation Executive Summary
More informationAdministrative Guidance for Internally Assessed Units
Administrative Guidance for Internally Assessed Units CiDA Certificate in Digital Application This document covers the requirements for the following units: Unit 2 Creative Multimedia (DA202) Unit 3 Artwork
More informationPROCESS FOR INITIAL CERTIFICATION OF CERTIFIED SCRUM TRAINER PROFESSIONALS WITH CERTIFICATION STANDARDS
PROCESS FOR INITIAL CERTIFICATION OF CERTIFIED SCRUM TRAINER PROFESSIONALS WITH CERTIFICATION STANDARDS Introduction Certified Scrum Trainer professionals ( CSTs ) play a vital role within Scrum Alliance.
More informationTransparency & Trust: A guide for landlords & tenants to data protection and privacy
Transparency & Trust: A guide for landlords & tenants to data protection and privacy 20 June 2017 Novotel Leeds Publication by HouseMark in association with Anthony Collins Solicitors and AmicusHorizon
More informationCourse Collect user manual 11/08/2014 V1.0
11/08/2014 V1.0 Copyright Published by: UCAS Rosehill New Barn Lane Cheltenham GL52 3LZ UCAS 2014 All rights reserved. UCAS is a registered trade mark. UCAS, a company limited by guarantee, is registered
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationYes. [No Response] General Questions
General Questions Q1. Do you agree that the proposals to refine the WHOIS opt-out eligibility and to provide a framework for registrar privacy services meets the policy objectives set out in the consultation
More informationStarting Next Year's Curriculum Early. Applicable to 2015 onwards. Mini Guide
Starting Next Year's Curriculum Early Applicable to 2015 onwards Mini Guide Revision History Version Change Description Date 2015-1.0 Initial release. 22/05/2015 Capita Business Services Ltd 2015. All
More informationONS Beta website. 7 December 2015
ONS Beta website Terminology survey results 7 December 2015 Background During usability sessions, both moderated and online, it has become clear that users do not understand the majority of terminology
More information