CSU Enterprise Identity Management Trust- Level Framework

Size: px
Start display at page:

Download "CSU Enterprise Identity Management Trust- Level Framework"

Transcription

1 CSU Enterprise Identity Management Trust- Level Framework Version November 2015 Page 1 v1.0

2 Table of Contents Purpose of this Document... 3 Executive Summary... 3 Motivation... 4 CSU Trust Level Model... 5 Identity Trust Levels... 6 Identity Proofing... 6 Identity Reconciliation... 6 Identity Trust Levels for Affiliations... 7 Authentication Trust Levels... 9 Authentication Assertion Protection Level... 9 Example Trust Levels applied to Applications... 9 Appendix A. Attorney-General s Identity Proofing Objectives and Evidence Weightings Identity Proofing Objectives Appendix B. Australian Access Federation Levels of Assurance Table of Figures Figure 1 - CSU Identity Trust Levels... 5 Figure 2 - Authentication Trust Levels... 5 Figure 3 - Authentication Assertion Protection Level... 5 Figure 4 - Identity Attributes and Evidence required to establish trust level... 6 Figure 5 Trust Levels for affiliations... 8 Figure 6 Trust Levels for affiliations applied to Applications... 9 Page 2 v1.0

3 Purpose of this Document The purpose of this document is to establish a framework relating to Trust Levels for identities that have an affiliation with CSU. The framework can be utilised to help assess the requirements for delivering services to the wide variety of people the university engages with. Executive Summary Universities have traditionally had fairly static and clear cut boundaries relating to the people it deals with the University Community. Academic and support staff as well as students generally form the basis of the community with relatively limited numbers of alternate association types. Rapid changes in the higher education landscape bought about by evolving technology based pedagogies as well as a move to a more competitive commercial environment has meant the focus has moved from a bricks and mortar paradigm to providing services to a large range of people in any location as well as more aggressive recruitment strategies. This framework introduces a taxonomy for defining the types and levels of Trust applicable at CSU as well as relating the Trust Level and Identity Management processes to the various affiliations that people have with the university and the diverse affiliation journeys they may take through their period of engagement. Page 3 v1.0

4 Motivation The establishment of Trust Levels provides a standardised method of: Assessing the level of confidence in the legitimacy of an identity to ensure appropriate access to services and application functionality. Mitigating risk of exposure of sensitive data by controlling access to systems that hold that data. Evaluating the rigour of authentication processes to insure they are conducted in a secure way. The ability to control access to systems based on Trust Levels can be leveraged to extend the creation and management of identity accounts to people that fall outside the established community boundaries. This means a CSU identifier and credential set that accompany the identity across varying affiliations can be allocated prior to the traditional community entry points. Trust Levels also provide a way to allow system access to identities with only a cursory affiliation with the university, were assigning resources to conducting identity verification and reconciliation processes is not viable. Segregating access via trust levels used in conjunction with common identifiers and credentials helps facilitate: A smoother path through entry processes such as admissions by not requiring a change in Credentials at the point of enrolment. People that already have an account to engage with those processes with their common CSU credentials. Seamless User Experience by use of common credentials and identifiers across a Single Sign-On environment Allows identity and other related data to be moved between systems using the allocated CSU identifier. Allows linking of identities via the CSU identifier to track and analyse activities across the gamut of affiliations Page 4 v1.0

5 CSU Trust Level Model The model relates to three distinct aspects of the identity s interaction with services and applications. 1. Identity Trust Levels - The level of confidence that the person is who they say they are and consists of Identity Proofing and Identity Reconciliation. Note: The Federated Identity Column equates the AAF Levels of Assurance (LoA) to the CSU trust Level Trust Level Name Description Federated Identity 1 ITL-0 Anonymous No Identity information is known ITL-1 Self-Registered Self-Registered with confirmed Unique Address or Social Logon ITL-2 Trusted Source Identity data is provided by a trusted source where preliminary Identity Verification is carried out ITL-3 Gateway The identity has been established via CSU Identity Gateway processes and checks. Proof of identity requirements are not rigidly enforced but the person may: - Vouched for and managed by a CSU Staff member - Incidentally provide other documents that match asserted Identity Attributes (e.g. Proof of previous study) - Declare data information they have provided is true and Accurate - Provide information that can be verified with other authorities (e.g. Tax File Number or Bank Account) ITL-4 Legislative Because of legislative requirements of an identity s affiliation there is additional documentary evidence that must be sighted. (e.g. Visa Documents or Working with Children Certificate) ITL-5 Certified Approved documents in conjunction with suitable Photographic evidence is produced in presence of CSU Staff Member or trusted agent Figure 1 - CSU Identity Trust Levels 2. Authentication Trust Level - Level of confidence in a persons asserted Digital Identity i.e. the stringency of authentication. LoA1 LoA1 LoA2 Trust Level Name Description ATL-0 Public No authentication ATL-1 Proxied Requires authentication to one application that has a Trust Relationship with the application. Authentication to the first application ensures only authorised use E.g. LTI integration with the Learning Management System ATL-2 Single Factor Identity is proven by providing validated credentials (username and Password) ATL-3 Multi-Factor Identity is proven by providing validated credentials (username and Password) plus at least one additional method of authentication (PIN, One-Time Password) Figure 2 - Authentication Trust Levels 3. Authentication Assertion Protection Level - Level of Confidence in the security of the Authentication Process Protection Level Name Description AAP-0 Unencrypted The authentication process is conducted without encryption AAP-1 Encrypted The authentication process is conducted across encrypted network and cookies and tokens are encrypted Figure 3 - Authentication Assertion Protection Level 1 Refer to Appendix B. Australian Access Federation Levels of Assurance Page 5 v1.0

6 Identity Trust Levels Identity Proofing The National Identity Proofing Guidelines issued by the Australian Governments Attorney-General s Department defines Identity Proofing as follows, and provides a model for weighting various types of evidence used in the process. Identity proofing is the process of capturing and confirming information to a specified or understood level of assurance to provide organisations with confidence in the identity of a person with whom they are interacting with for the first time. Identity Proofing Objectives The veracity of claims about a person s identity is established through evidence provided to meet some or all of the following five identity proofing objectives (depending on confidence in the claimed identity required): 1. Confirm uniqueness of the identity in the intended context 2. Confirm the claimed identity is legitimate (to ensure the identity has not been fraudulently created) 3. Confirm the operation of the identity in the community over time 4. Confirm the linkage between the identity and the person claiming the identity 5. Confirm the identity is not known to be used fraudulently Identity Reconciliation Identity reconciliation is the process of comparing a new identity account against existing accounts to ensure they are in fact the same person and duplicate identities are not being recorded. This ensures the correct trust levels are applied and allows auditing of an identities across the enterprise. The Table below represents: The Attributes that are mandatory to achieve the Trust Level as well as attributes that aid the reconciliation process. The levels of documentary evidence that should be provided. Identity Attributes Documentary Evidence 2 First Name Preferred First Name Middle Name Identity Trust Levels Name ITL-0 Anonymous ITL-1 Self-Registered * + + * * ITL-2 Trusted Source * + + * + * * * ITL-3 Gateway * + + * + * * * ITL-4 Legislative * + + * + * * * + + * ITL-5 Certified * + + * + * * * + * * - Not applicable + Contributes to reconciliation processes * Mandatory Figure 4 - Identity Attributes and Evidence required to establish trust level Last Name Former Last Name Date Of Birth Gender Address Tax File Number Primary 2 Refer to Appendix A. Attorney-General s Identity Proofing Objectives and Evidence Weightings. Page 6 v1.0

7 Identity Trust Levels for Affiliations The following Table indicates the appropriate Identity Trust Levels assigned to different affiliations that identities maintain with CSU. Group Affiliation Description ITL Has IGMS Group Miscellaneous Anonymous A person that has interacted with CSU via a service or event (online or in person) where knowing the person's identity is not required. ITL-0 - General Public ITL-0 - Community Member ITL-0 - Community Borrower An individual who is not a student or employee of the University who has registered with the Library for the purpose of borrowing from the CSU library. ITL-3 X AAF Affiliate ITL-0 - Contractor ITL-0 - Lead A person that has interacted with CSU via a service or event (online or in person) within the context of learning and teaching and that CSU would like to be ITL-0 - aware of the person's activity. A person may interact many times across different services or events. Guest ITL-0 - Delivery Partner ITL-0 - Agent ITL-0 - (Unpaid) Practicum Supervisor Individuals who supervise CSU students on practicum placement but they are not employees of the University. ITL-0 X External Enterprise Employee ITL-3 - Parent (of student) ITL-0 - Alumnus ITL-0 - Customers Prospective Student Prospective Student is a person that has registered their interest in studying at CSU via a future student service or event. ITL-1 - UAC Preference UAC admission applicant who has nominated a CSU course as one of their course preferences and not necessarily their first preference. A UAC Applicant can ITL-2 - nominate up to nine preferences. VTAC Preference VTAC admission applicant who has nominated a CSU course as one of their course preferences and not necessarily their first preference. A VTAC Applicant ITL-2 - can nominate more than one preference. UAC Applicant UAC Applicant is a person that has decided to lodge an application for admissions into CSU through UAC office. ITL-2 - VTAC Applicant VTAC Applicant is a person that has decided to lodge an application for admission into CSU through VTAC office. ITL-2 - Articulating student - UAC Scholarship Applicant ITL-2 - Applicant Applicant is a person that has decided to lodge an application for admissions with CSU. A person may lodge more than one application in a given admissions ITL-1 - period. Applicant can be further classified as a 'direct', UAC or VTAC applicant to indicate initial data capture point. Offered Applicant Applicant is a person that has decided to lodge an application for admissions with CSU and has received a formal letter of offer. ITL-3 X Students (Current) Student A person who has an active program enrolment for a course of study at CSU. ITL-3 X Page 7 v1.0

8 Human Resources Graduating Student A person who has successfully completed program accreditation resulting in the testamur course of study at CSU. ITL-3 - Past Student A person who was previously an enrolled student but currently does not have an active program enrolment for a course of study at CSU. ITL-3 X Policing Student A person who has an active program enrolment for a course of study at CSU convened by the School of Policing or the Australian Graduate School of Policing ITL-3 - and Security (AGSPS). Higher Degree Research Student A person who has an active program enrolment for a course of study at CSU where the course has a classification of 'doctorate by research' or 'master by research'. ITL-3 X Prospective Employee A person or business identified (or self-identified) as a possible future employer of current and or past CSU students. Providing work for pay. ITL-0 - Temporary Staff ITL-3 X Staff Member ITL-5 X Casual Staff ITL-3 X Affiliate A person who has a formal affiliation with CSU, similar to staff in online service privileges except they are unpaid. Namely the CSU Chancellor, CSU Council ITL-3 X Members and visiting appointments. Paid Practicum Supervisor Associated teachers who are paid by the University for the supervision of CSU students on practicum placement but they are not employees of the University. ITL-3 X Currently only for Faculty of Education practicum supervision External Exam Invigilator ITL-3 - Employer A person or business that employs one or more current and or past CSU students. Providing work for pay. ITL-0 - Figure 5 Trust Levels for affiliations Page 8 v1.0

9 Authentication Trust Levels The second component of the trust model is Authentication Trust Levels. This relates to the process that surrounds the authentication to the system that is being accessed. This can range from no authentication at all through to complex Multi-Factor arrangements. Authentication Assertion Protection Level Finally the Authentication Assertion Protection Level Example Trust Levels applied to Applications The Following table shows examples of the various trust levels applied to applications. This helps to define the various aspects of interfacing with the applications and services as well as defining the 3 Trust levels for the affiliations that use the system. Name Aspect Affiliations Identity Trust Level Authentication Trust Level Authentication Assertion Protection Level Academic Workload Calculator Casual Registration Prospective Staff Staff Use Staff Tax Registration Prospective Staff Adobe Connect Application Guest LMS Staff Student Aleph Web Staff Student Community Borrower Alesco WebKiosk Staff Ex-Staff Forms Access Staff Archibus + IFM + Cadcorp FMCentral General Public Staff Member Student Argos Evision Staff ARIS Web Interface Staff Banner Finance Forms Access Staff Online Budget Reports Staff Figure 6 Trust Levels for affiliations applied to Applications Page 9 v1.0

10 Appendix A. Attorney-General s Identity Proofing Objectives and Evidence Weightings. Identity Proofing Objectives The veracity of claims about a person s identity is established through evidence provided to meet some or all of the following five identity proofing objectives (depending on confidence in the claimed identity required): 1. Confirm uniqueness of the identity in the intended context to ensure that individuals can be distinguished from one another and that the right service is delivered to the right individual. This would include a check that another person has not previously claimed ownership of the identity (i.e. there is a sole claimant), for example by checking the organisation s database for identity records with the same attributes. 2. Confirm the claimed identity is legitimate to ensure the identity has not been fraudulently created (i.e. the identity is that of a real person) through evidence of commencement of identity in Australia. Where greater confidence in the claimed identity is required, this objective may also include a check that an identity has not been recorded as deceased (e.g. through the Fact of Death file). 3. Confirm the operation of the identity in the community over time to provide additional confidence that an identity is legitimate in that it is being used in the community (including online where appropriate). Even where a person is able to obtain genuine identity documents in a fictitious name, it will be harder to provide evidence that the identity has been active in the community, particularly over an extended period of time and if evidence reflects the breadth of a person s life, such as: Citizen: evidence that demonstrates the person s life as a citizen and any support or services they are provided by government Money: evidence that demonstrates the person s financial and working life, and Living: evidence that demonstrates where they live and what they consume. 4. Confirm the linkage between the identity and the person claiming the identity to provide confidence that the identity confirmed through objectives 2 and 3 is not only legitimate, but that the person claiming the identity is its legitimate holder. This has traditionally been done by comparing a person s face against a photograph, although there is an increasing range of technologies that can provide alternative methods, such as comparison of a biometric captured at enrolment against a biometric previously captured by a trusted organisation. 5. Confirm the identity is not known to be used fraudulently to provide additional confidence that a fraudulent (either fictitious or stolen) identity is not being used. This could be through checks against internal registers of known fraudulent identities or against dummy records recorded in the system. Where possible, this could include checks against information provided by external sources, such as law enforcement agencies Page 10 v1.0

11 Type of evidence Objective 3: Evidence of Identity Operating in the Community DFAT issued Certificate of Identity DFAT issued Document of Identity DFAT issued United Nations Convention Travel Document Foreign government issued documents (e.g. driver licences) Medicare Card Enrolment with the Australian Electoral Commission Security Guard/Crowd Control photo licence Evidence of right to a government benefit (DVA or Centrelink) Consular photo identity card issued by DFAT Police Force Officer photo identity card Australian Defence Force photo identity card Commonwealth or state/territory government photo identity card Aviation Security Identification Card Maritime Security Identification Card Firearms licence Credit reference check Australian tertiary student photo identity document Australian secondary student photo identity document Certified academic transcript from an Australian university Trusted referees report Bank card Credit card Other authoritative online sources of evidence verified by a Third Party Identity Provider Tax File Number Evidence of digital footprint /mobile/social Objective 2 evidence of commencement of identity (at LoA 2 only) Objective 4: Evidence of a linkage between a person and a claimed identity Australian passport (including Ordinary, Frequent traveller, Diplomatic, Official and Emergency) Foreign passport Australian driver licence DIBP ImmiCard If no other primary evidence types available to establish linkage: Australian government issued proof of age card / photo card If no other primary evidence types available to establish linkage: Australian secondary student identity document (issued by a government agency or Australian school only) Weighting Primary Primary Primary Primary Primary Primary (only for under 18 years) Page 11 v1.0

12 Appendix B. Australian Access Federation Levels of Assurance The Australian Access Federation (AAF) facilitates the use of CSU credentials to access a range of services provided by research organisations and Tertiary Institutions. These services can be restricted to CSU identities for which the university has asserted a level of identity proofing and reconciliation known as Levels of Assurance. Level of Assurance 1 Registration and identity-proofing requirements (edupersonassurance = urn:mace:aaf.edu.au:iap:id:1) Y/N NIST page# N/A Requirement Document your processes for issuing credentials. Note this is a baseline requirement for complying with the AAF Federation Rules. There are no additional requirements for identity proofing at Level 1. Level of Assurance 2 Registration and identity-proofing requirements (edupersonassurance = urn:mace:aaf.edu.au:iap:id:2) Y/N NIST Requirement page# 33 The applicant has undergone an in-person registration process at your organisation during which they have demonstrated possession of a valid current primary government picture ID that contains their picture and either their address of record or their nationality of record in other words, either a driver s license or a passport. 33 During the registration process the Registration Authority (RA) at your organisation inspects the applicant s photo ID, compares the picture to the applicant, and records the ID number, the address, and the date of birth. 33 If the photo ID appears to be valid and the photo matches the applicant, then a) If personal information in records includes a telephone number or address, the CSP issues credentials in a manner that confirms the ability of the Applicant to receive communications at phone number or address associated with the Applicant in records. Any secret sent over an unprotected session shall be reset upon first use; or b) If ID confirms address of record, RA authorizes or CSP issues credentials. Notice is sent to address of record, or; c) If ID does not confirm address of record, CSP issues credentials in a manner that confirms the claimed address. 35 If the registration process, identity proofing, token creation/issuance and credential issuance take place as separate physical encounters or electronic transactions, you have ensured the same party acts as applicant throughout the processes using the following method: The applicant identifies himself in any new electronic transaction by presenting a temporary secret which was established during a prior transaction of encounter, or sent to the applicant s phone number, address, or physical address of record. The applicant identifies himself in person by either using a secret as described above, or through the use of a biometric characteristic that was recorded during a prior encounter (such as a student/staff card displaying their photo). 31 You have followed the documented processes in a practice statement that demonstrates these requirements are met. Page 12 v1.0

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment

More information

Better Healthcare with My ehealth Record

Better Healthcare with My ehealth Record Better Healthcare with My ehealth Record What is My ehealth Record? My ehealth Record is a way of securely storing and sharing important healthcare information with your consent, so that it is easily and

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Stakeholder and community feedback. Trusted Digital Identity Framework

Stakeholder and community feedback. Trusted Digital Identity Framework Stakeholder and community feedback Trusted Digital Identity Framework Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and the rights explicitly

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Responsible Officer Approved by

Responsible Officer Approved by Responsible Officer Approved by Chief Information Officer Council Approved and commenced August, 2014 Review by August, 2017 Relevant Legislation, Ordinance, Rule and/or Governance Level Principle ICT

More information

Access Control Policy

Access Control Policy Access Control Policy Version Control Version Date Draft 0.1 25/09/2017 1.0 01/11/2017 Related Polices Information Services Acceptable Use Policy Associate Accounts Policy IT Security for 3 rd Parties,

More information

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date)

STORAGE OF SSAN. Security Risk Assessment and SECURITY PLAN. (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) STORAGE OF SSAN Security Risk Assessment and SECURITY PLAN (insert name of company) SUBMITTED TO REGULATORY AUTHORITY: (insert date) IMPLEMENTED: (insert date) LICENCE DETAILS: No: Issue date: (Note: You

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

IDENTITY THEFT PREVENTION Policy Statement

IDENTITY THEFT PREVENTION Policy Statement Responsible University Officials: Vice President for Financial Operations and Treasurer Responsible Office: Office of Financial Operations Origination Date: October 13, 2009 IDENTITY THEFT PREVENTION Policy

More information

Individual User Guide for QA i-portal

Individual User Guide for QA i-portal Individual User Guide for QA i-portal Version 1.0 Examples shown in this User Guide are for demonstration purpose only. They might not reflect the actual information published on QA i-portal. Table of

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

Identity Proofing Standards and Beyond

Identity Proofing Standards and Beyond Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing

More information

ISSUING and REVOCATION OF CERTIFICATES RTO - 34

ISSUING and REVOCATION OF CERTIFICATES RTO - 34 Purpose The purpose of this policy is to outline how TCI will ensure it issues qualifications and statements of attainment (as appropriate) to persons whom it has assessed as competent in accordance with

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

PROFESSIONAL REGULATORY BOARD OF ACCOUNTANCY ACCREDITATION:

PROFESSIONAL REGULATORY BOARD OF ACCOUNTANCY ACCREDITATION: PROFESSIONAL REGULATORY BOARD OF ACCOUNTANCY ACCREDITATION: PUBLIC PRACTICE OF ACCOUNTANCY Requirements for Sole Practitioner INITIAL 2. Photo copy of valid Professional Identification card 3. Duly signed

More information

What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1

What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1 What is a Dataset? Information Security and Privacy Office (ISPO) Risk Assessment Program August 2018 Version 1.1 Risk Assessments - Datasets Dataset Definition A dataset (or data set) is a collection

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Update business details for business accounts

Update business details for business accounts Update business details for business accounts About this form: If you re a Business Optimiser or Business Term Deposit customer and need to change your authorised users or contact information, this is

More information

Measuring Authentication: NIST and Vectors of Trust

Measuring Authentication: NIST and Vectors of Trust SESSION ID: IDY-F01 Measuring Authentication: NIST 800-63 and Vectors of Trust auth Sarah Squire Senior Identity Solution Architect Engage Identity @SarahKSquire Eyewitness News 3 A Play in Five Acts

More information

Registration and Authentication

Registration and Authentication Registration and Authentication e-government Strategy Framework Policy and Guidelines Version 3.0 September 2002 Registration and Authentication / Version 3.0 / September 2002 1 Contents 1. Introduction

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

1. Federation Participant Information DRAFT

1. Federation Participant Information DRAFT INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

This qualification is expiring. The last date to meet the requirements is 31 December 2012.

This qualification is expiring. The last date to meet the requirements is 31 December 2012. NQF Ref 0784 Version 3 Page 1 of 12 National Diploma in Business (Level 6) Level 6 Credits 120 This qualification is expiring. The last date to meet the requirements is 31 December 2012. Purpose This qualification

More information

in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012

in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 Identity Management and Federation of Identity in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 HRSDC - National Service Delivery HRSDC and its service

More information

State of Colorado Cyber Security Policies

State of Colorado Cyber Security Policies TITLE: State of Colorado Cyber Security Policies Access Control Policy Overview This policy document is part of the State of Colorado Cyber Security Policies, created to support the State of Colorado Chief

More information

Employment Ontario Information System (EOIS) Case Management System

Employment Ontario Information System (EOIS) Case Management System Employment Ontario Information System (EOIS) Case Management System Service Provider User Guide Service Provider User Management Version 1.1 December 2015 Table of Contents Service Provider User Management...1

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

European Risk Management Certification. Candidate Information Guide

European Risk Management Certification. Candidate Information Guide European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap

More information

InCommon Federation: Participant Operational Practices

InCommon Federation: Participant Operational Practices InCommon Federation: Participant Operational Practices Participation in the InCommon Federation ( Federation ) enables a federation participating organization ( Participant ) to use Shibboleth identity

More information

5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented.

5. The technology risk evaluation need only be updated when significant changes or upgrades to systems are implemented. Annex to the Financial Services Businesses Handbook Using Technology in the Customer Due Diligence Process A.1. Technology Risk Evaluation 1. A financial services business must, prior to deciding whether

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

eapplication Guide for Year 12 applicants

eapplication Guide for Year 12 applicants Contents Creating an Account... 2 General Information... 2 Student at University of Tasmania... 4 Security Question... 5 Phone... 5 Home/Residential Address... 6 Name Details Confirmation... 7 Your Application...

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

FedRAMP Digital Identity Requirements. Version 1.0

FedRAMP Digital Identity Requirements. Version 1.0 FedRAMP Digital Identity Requirements Version 1.0 January 31, 2018 DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR 1/31/2018 1.0 All Initial document FedRAMP PMO i ABOUT THIS DOCUMENT

More information

Policies & Regulations

Policies & Regulations Policies & Regulations Email Policy Number Effective Revised Review Responsible Division/Department: Administration and Finance / Office of the CIO/ Information Technology Services (ITS) New Policy Major

More information

- OQSF - Occupational Qualifications Sub-framework

- OQSF - Occupational Qualifications Sub-framework All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: University of Toronto Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Terms and Conditions. FOUNDATION STUDIES Application guide. newcastle.edu.au/enabling. Before you begin...

Terms and Conditions. FOUNDATION STUDIES Application guide. newcastle.edu.au/enabling. Before you begin... FOUNDATION STUDIES Application guide + Terms and Conditions Before you begin... After completing Step One - registered an email and password - you can log-out of the application process at any time and

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

This qualification has been reviewed. The last date to meet the requirements is 31 December 2018.

This qualification has been reviewed. The last date to meet the requirements is 31 December 2018. NZQF NQ Ref 1498 Version 2 Page 1 of 18 National Diploma in Business (Level 5) with optional strands in Accounting, Finance, Finance - Māori, Health and Safety, Human Resource, Māori Business and, Marketing,

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Securing the New Perimeter:

Securing the New Perimeter: Microsoft Future Decoded Securing the New Perimeter: Identity as the Keystone with Heathrow Airport 01/11/2018 Divider Title Slide Name Here Some Facts & Figures.. Passengers Team Heathrow Flights Size

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Continuing Professional Development Program Guidelines

Continuing Professional Development Program Guidelines Continuing Professional Development Program Guidelines Much of what is learned in obtaining a qualification in today s rapidly changing business environment can quickly become obsolete. Most would agree

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

PRIVACY POLICY 1. ABOUT THIS POLICY

PRIVACY POLICY 1. ABOUT THIS POLICY Updated Privacy Policy We ve recently updated our Privacy Policy. The updated Privacy Policy will automatically come into effect on 6 August 2018. Your c ontinued use of the Platform from that date onwards

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS

UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS UNIFORM STANDARDS FOR PLT COURSES AND PROVIDERS July 2015 212001734.08 Contents 1. CORE STANDARDS FOR PLT COURSES 1 1.1 Fundamental requirement 1 1.2 Course objectives 1 1.3 Course content 1 1.4 Teaching

More information

POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES

POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES POLICY FOR THE RE-ISSUE OF NATIONAL CERTIFICATES Umalusi Umalusi House 37 General van Ryneveld Street Persequor Technopark Pretoria PO Box 151 Persequor Technopark Pretoria 0020 South Africa Tel: +27 12

More information

ONLINE ADMISSION 2017 QUICKSTART v

ONLINE ADMISSION 2017 QUICKSTART v ONLINE ADMISSION 2017 QUICKSTART v.1.2-2017 In order to fill correctly the online application form you must navigate through the links in the application itself. You must NOT click the Back browser button,

More information

Haaga-Helia University of Applied Sciences Privacy Notice for Student Administration

Haaga-Helia University of Applied Sciences Privacy Notice for Student Administration Haaga-Helia University of Applied Sciences Privacy Notice for Student Administration In compliance with the requirements of the EU General Data Protection Regulation (GDPR, Articles 13, 14 and 30) Created

More information

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017

BS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017 PROGRAMME APPROVAL RECORD AND CERTIFICATE (PARC) PART 1 - GENERAL INFORMATION Programme title Award title Awarding Body/Institution Teaching Institution (if different) Language of Study UCAS Code Programme

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

CONTENTS 1) OVERVIEW OF ICAS 2. 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5

CONTENTS 1) OVERVIEW OF ICAS 2. 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5 CONTENTS 1) OVERVIEW OF ICAS 2 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5 3) THE INTEGRATED CAMPUS ADMINISTRATION SYSTEM THE MODULES 7 Applications & Enquiries Module 7 Registration

More information

SWAMID Identity Assurance Level 2 Profile

SWAMID Identity Assurance Level 2 Profile Document SWAMID Identity Assurance Level 2 Profile Identifier http://www.swamid.se/policy/assurance/al2 Version V1.0 Last modified 2015-12-02 Pages 11 Status FINAL License Creative Commons BY-SA 3.0 SWAMID

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Acadia University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

CPA Exam and Licensure Information and FAQs

CPA Exam and Licensure Information and FAQs CPA Exam and Licensure Information and FAQs 1 CPA Exam and Licensure Information and FAQs July 2016 Dr. Gary Colbert, Director of Accounting Programs, University of Colorado Denver 1 Education and experience

More information

NCG Carlisle College Privacy Statement

NCG Carlisle College Privacy Statement NCG Carlisle College Privacy Statement 1. Overview We ask that you read this privacy notice carefully as it contains important information on who we are, how and why we collect, store, use and share your

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

Qualification details

Qualification details Qualification details Title New Zealand Certificate in Project Management (Level 4) Version 1 Qualification type Certificate Level 4 Credits 60 NZSCED 080315 Management and Commerce > Business and Management

More information

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Introduction of the Identity Assurance Framework. Defining the framework and its goals Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating

More information

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018 SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina

More information

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09 Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance

More information

Tenancy Application Form

Tenancy Application Form Rental Property: property Tenancy Application Form Tenancy Requirements: Length of tenancy Rent commencement date Occupancy details: () No. of occupants who live in this property No. and ages of children

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

USI Registry System. User Guide. for

USI Registry System. User Guide. for USI Registry System User Guide for Training Organisations VET Admission Bodies VET Related Bodies Version 1.0 October 2014 This user guide has been prepared to assist users of the Unique Student Identifier

More information

Procedures for responding to requests for personal data to support Data Protection Policy

Procedures for responding to requests for personal data to support Data Protection Policy Procedures for responding to requests for personal data to support Data Protection Policy Heriot-Watt Procedures for responding to requests for personal data; to support Data Protection Policy HERIOT-WATT

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES (POP)

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES (POP) INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES (POP) GALLAUDET UNIVERSITY Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant")

More information

Tenancy Application Form

Tenancy Application Form Rental Property: Property Tenancy Application Form Tenancy Requirements: Length of tenancy Rent commencement date Occupancy details: () No. of occupants who live in this property No. and ages of children

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

How to apply for a bachelor?

How to apply for a bachelor? How to apply for a bachelor? Contents Introduction... 4 Step 1: Create an account... 5 The field statute... 6 Bank account number... 6 Address... 6 Click Save... 6 Step 2: Privacy preferences... 7 Step

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Okanagan College Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Certification Requirements and Application Procedures for Persons and Firms.

Certification Requirements and Application Procedures for Persons and Firms. 391-3-24-.05 Certification Requirements and Application Procedures for Persons and Firms. (1) Scope. (a) Following the submission of an application demonstrating that all the requirements of this Rule

More information

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard Kiosk Security Standard 1. Purpose This standard was created to set minimum requirements for generally shared devices that need to be easily accessible for faculty, staff, students, and the general public,

More information

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying

EDUCATOR. Certified. to know to become a. What you need. in Florida. General Certification. Requirements for. Individuals Applying What you need to know to become a Certified EDUCATOR in Florida General Certification Requirements for Individuals Applying for Initial Certification Beginning July 1, 2002 Bureau of Educator Certification

More information

TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE / / Version Class-2 Certificate (Company)

TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE / / Version Class-2 Certificate (Company) TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE Instructions: USER TYPE COMPANY 1. Please fill the form in BLOCK LETTERS 2. Items marked with * are mandatory.

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests.

1.7 The Policy sets out the manner by which the University will respond to Subject Access Requests. 1 Introduction 1.1 Article 15 of the General Data Protection Regulations (GDPR) provides individuals (Data Subjects) with the right to access personal information so that they are fully informed of the

More information

Credentialing for InCommon

Credentialing for InCommon Credentialing for InCommon Summary/Purpose: This policy describes the means by which user accounts and credentials are managed by the University of Mississippi, as related to participation in the InCommon

More information

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects

BISHOP GROSSETESTE UNIVERSITY. Document Administration. This policy applies to staff, students, and relevant data subjects BISHOP GROSSETESTE UNIVERSITY Document Administration Document Title: Document Category: Privacy Policy Policy Version Number: 1.0 Status: Reason for development: Scope: Author / developer: Owner Approved

More information