Grant Name: Development of Inter-Agency Rare Species Data Sharing and Exchange for Statewide Wildlife Conservation Planning.

Similar documents
Acceptable Use Policy

Sparta Systems TrackWise Digital Solution

Information Security Policy

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

Adobe Sign and 21 CFR Part 11

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Re: Request for Access to Data (Minn. Stat , subd. 3) Law Enforcement Mobile Biometric Technologies

CORAL Resources Module User Guide

Access to University Data Policy

Arkansas MAV Conservation Delivery Network

DIGITAL STEWARDSHIP SUPPLEMENTARY INFORMATION FORM

MMARS Financial, Labor Cost Management (LCM) and Commonwealth Information Warehouse (CIW) Reports

Provider Monitoring Process Overview Training. Updated August Course#: C Music Only No Narration

Introduction to SURE

A company built on security

Conducting a Self-Assessment of a Long-Term Archive for Interdisciplinary Scientific Data as a Trustworthy Digital Repository

Lessons Learned. Implementing Rosetta in the Harold B. Lee Library

Security Standards for Electric Market Participants

28 September PI: John Chip Breier, Ph.D. Applied Ocean Physics & Engineering Woods Hole Oceanographic Institution

EHS RegTracker. User Guide. (800)

1. Federation Participant Information DRAFT

Non Profit. For Profitt. Other: Address: Administrative $500 $700 $ 1,000. Technology

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Red Flags Program. Purpose

RECOVERY PROGRAM Recovery Program Project Number: 170 FY SCOPE OF WORK for:

Participant Agreement. Updated December 1, 2016 and approved by the OK-First Advisory Committee

UC Irvine LAUC-I and Library Staff Research

Guide to Status Only Annual Reviews and Re-appointments

Importance of cultural heritage:

County of Sacramento

For those of you who may not have heard of the BHL let me give you some background. The Biodiversity Heritage Library (BHL) is a consortium of

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

State Government Digital Preservation Profiles

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11

Subject: University Information Technology Resource Security Policy: OUTDATED

Supervisors of Elections DOS Online Grants System User Manual

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Best Practices for Organizing Electronic Records

Online Reliance System FAQs

TIER Program Funding Memorandum of Understanding For UCLA School of

Nova Scotia Health Authority Research Ethics Board. Researcher s (PI) User Manual

Defense Health Agency Protected Health Information Management Tool (PHIMT)

2 Creating New CCQAS 2.8 User Accounts

Supersedes Policy previously approved by TBM

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

7 Processing Applications for Interfacility Credentials Transfer Briefs (ICTBs)

Maryland OneStop Statewide License Portal State of Maryland Department of Information Technology

Sparta Systems TrackWise Solution

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Introduction to Archivists Toolkit Version (update 5)

Customer Compliance Portal. User Guide V2.0

Make sure you delete all red type explanations. NOTE: Anticipate no action on applications that do not meet the timeline as posted on the IRB web site

I-Supplier Portal SIGN UP NOW SUPPLIERS REGISTRATION NATIONAL GUARD HEALTH AFFAIRS LOGISTICS & CONTRACTS MANAGEMENT DEADLINE 17 AUGUST 2011

Guide to Adjunct and Part Time Clinical Re- Appointments

Data Management Plan: OR Mooring - Ocean Acidification related measurements (Taken from NOAA Data Sharing Template and adapted for IOOS Certification)

TOPIC 3 THE LIFE CYCLE & CONTINUUM CONCEPT OF RECORDS MANAGEMENT. Dr. M. Adams I N T R O D U C T I O N T O R E C O R D S M A N A G E M E N T

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

Secure Web Fingerprint Transaction (SWFT) Access, Registration, and Testing Procedures

Training Guide for Arkansas Law Enforcement Officers and Licensing Board Representatives

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Advisory Circular. Subject: INTERNET COMMUNICATIONS OF Date: 11/1/02 AC No.: AVIATION WEATHER AND NOTAMS Initiated by: ARS-100

State Government Digital Preservation Profiles

Good Laboratory Practice GUIDELINES FOR THE ARCHIVING OF ELECTRONIC RAW DATA IN A GLP ENVIRONMENT. Release Date:

Oracle. Service Cloud Knowledge Advanced Implementation Guide

I. PURPOSE III. PROCEDURE

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Records Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017

USER GUIDE: NMLS Course Provider Application Process (Initial)

QNB Bank-ONLINE AGREEMENT

Virginia Commonwealth University School of Medicine Information Security Standard

CMS Enterprise Portal User Manual

Recordkeeping Standards Analysis of HealthConnect

Digital Preservation at NARA

***** Archive and Backup your Data before updating***** ****Ensure that you are running a minimum version of before updating****

Annenberg Public Policy Center Sensitive National Annenberg Election Survey Data 1 Access: Application

Credentials Policy. Document Summary

POLICIES AND PROCEDURES

Part 11 Compliance SOP

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview

Sparta Systems Stratas Solution

New Jersey Financial Aid Management System (NJFAMS) EOF Selection, Awarding, Certification, and Payment Request Process

eprost System Policies & Procedures

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS

MOTT COMMUNITY COLLEGE. Procedure for Cellular Telephones

defectx.com the internet defect tracking system defectx is more than just a way of tracking internet software bugs.

Records Retention Policy

Provider Monitoring Process

Customer Proprietary Network Information

Blackboard Content Collection Overview

DRS Policy Guide. Management of DRS operations is the responsibility of staff in Library Technology Services (LTS).

As a first-time user, when you log in you won t have any files in your directory yet.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

Cyber Partnership Blueprint: An Outline

Networked Access to Library Resources

Successful Scalability Techniques for Illinois Web Archive Search

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Transcription:

Grant Name: Development of Inter-Agency Rare Species Data Sharing and Exchange for Statewide Wildlife Conservation Planning. We created a digital repository of nearly 200 reports and data sets containing information about rare species in Oklahoma. These reports and data sets originated from a variety of sources including biological surveys and research projects conducted by or funded by the Oklahoma Biological Survey (OBS), Oklahoma Department of Wildlife Conservation, U.S. Fish and Wildlife Service, Department of Defense, National Forest Service, National Parks Service and state research universities. These files constitute the initial collection for the Oklahoma Biological Survey Data Catalog, a new, permanent repository for data regarding rare Oklahoma species. The Data Catalog will be accessible over the Internet for anyone to view and will be maintained by the OBS. The Data Catalog archives and serves data in a format that is readily accessible (.pdf files) 'and can be easily transferred or modified as software evolves. State, federal and nongovernmental conservation organizations and biologists will be encouraged to contribute additional data on rare Oklahoma species. Since 1988 the Oklahoma Natural Heritage Inventory (ONHI), a program of the Oklahoma Biological Survey, has maintained a database containing information on the status and distribution of rare species in Oklahoma. This information is widely used by conservation and permitting agencies, businesses, researchers, wildlife conservation planners and others. State and federal regulatory agencies, while themselves collecting rare species data, encourage and even direct permit applicants to ONHI for information on rare and endangered species, but do not consistently pass along their own data to the Oklahoma Natural Heritage Inventory to update and enhance this database. The ONHI lacks the resources to annually generate new information and occurrences for all of the rare, threatened, endangered and candidate species in Oklahoma. Therefore, when fellow conservation entities do not share their data, the utility of the ONHI database suffers; as does the quality of conservation planning that is dependent on this information.

The Oklahoma Natural Heritage Inventory initiated this project to enhance state wildlife planning efforts by facilitating the sharing and exchange of rare species occurrence data among natural wildlife resource agencies and organizations. These data include reports and data sets as well as the field notes and metadata associated with these. Field notes are of particular importance because these are rarely archived and tend to be lost over time. Data generated from a specific project may become a valuable resource to the collecting individual, collaborators and other investigators long after the initial project is concluded. Unfortunately, most data are eventually lost or rendered worthless over time for a variety of reasons. Data and reports are typically filed away electronically or on paper, but the'files may become misplaced, the paper may deteriorate, the electronic files,may become corrupted; or the'software/media evolves to a point where the electronic files can no longer be read. At some point, the investigator dies or retires and the data are essentially lost. Collectively, these processes have been termed "data entropy." A data catalog is the central component of this project and it is intended to provide a means to conveniently store data electronically and allowing it to be served online in a location that is readily accessible in a medium that will be upgraded as technology evolves. Facilitate state planning for rare wildlife species conservation by providing for and coordinating the disposition of rare species occurrence information already collected by state agencies into a central database. A temporary staff biologist, Bill Dengler, was hired to work with the staff of the Oklahoma Department of Wildlife Conservation (ODWC) and other conservation agencies to identify existing data holdings and to assist in the development of data sharing agreements. Initially, he worked with biologists at the ODWC and Oklahoma Biological Survey to locate completed reports for scanning and digital organization. These were primarily projects which had been funded through Section 6 of the Endangered Species Act (47 grants/projects) and other federal grant programs directed at rare species conservation (151 grants/projects). An Excel database was created to summarize each project's content, and electronic files of reports and data were built by either scanning paper documents or transferring and converting electronic files. Scanned paper files and transferred electronic files were placed into a.pdfformat. This format was chosen because it is widely used, easily accessible and should be relatively easy to update and keep current as the software is updated. Once reports were identified, an introductory letter was sent to the principle investigator(s) associated with each project explaining the data sharing project. Bill Dengler followed up by contacting the principle investigators and offering to meet with them to discuss the data sharing catalog and to encourage them to make their field notes

and raw data available for archiving. These meetings met with mixed success. In some cases, data entropy already had occurred and field notes and data were incomplete, entirely lost or unavailable. In other cases, principle investigators were reluctant to share raw data and field notes because of the sensitive nature of these data or because investigators wished to use these for future publications. However, some meetings were successful and copies of data were obtained for archiving. Additionally, some meetings led to other reports and data sets. Both Bill Dengler and Ian Butler made presentations at state conferences and spoke with biologists at meetings about the data sharing project and on-line data catalog. The intent was to gauge the scope of available data and the interest in data sharing among practicing biologists and conservationists. Concurrently with report and data acquisition, we began efforts to define an Internet-accessible data catalog and web application capable of delivering data and documents. We upgraded the data catalog server hardware and provided a backup service for the project. We researched and evaluated several options for providing web access for the data catalog and offering multiple levels of data security for the users. After working with several applications, we determined that a "Web-based Distributed Authoring and Versioning" system or WebDAV would be a cost effective, relatively low-maintenance and relatively easy to use system. We worked on the development of a WebDAV repository with encrypted authentication and data transmission over the Internet. A WebDAV is an application that allows users to collaboratively edit and manage files on a remote server and it provides these users with the ability to store files and access documents. WebDA V can be used for storing files on the web with relatively good security, as long as sessions are encrypted. Relevant features ofwebdav are that it can provide overwrite prevention for documents, users have the ability to query files and information about the authors, and it allows files to be organized into collections of related files. Additionally, most current operating systems provide support for WebDAV, which makes the access and use of files on WebDAV servers readily available to a wide range of users. During the course of the grant, we developed and tested an initial version of a more complex, web-based Data Catalog application. It is capable of providing some features normally found on Content Management Systems (CMS) for storing and accessing data. Our application would permit authors to store sensitive data in restricted locations, secured and hidden from general users, but would also permit authors to release data to specifically authorized users. In time, these data could be made available to a wider range of users at the author's discretion. However, as a result of our security and bug testing, we concluded that we would be unable to significantly reduce the potential for major Internet security problems in the application, if we deployed it as scheduled. Resolution of security problems within the grant time frame was not possible without additional funding, beyond the level we had anticipated. As a result, we suspended development and testing of the Data Catalog Web application until we can obtain another funding source for continuing code development.

The current tdata sharing catalog provides for "Web-based Distributed Authoring and Versioning" or WebDAV repository with encrypted authentication and data transmission, over the Internet. More detailed information about WebDAV systems can be obtained at http://en.wikipedia.org/wiki/webdav. WebDAV can be used for storing files on the web with relatively good security, as long as sessions are encrypted. I An assessment was undertaken of all project files located at the OBS (since the earl)\ 1970s) and the ODWC (since'the early 1980s) that pertained to rare or sensitive species. We also talked to numerous biologists and researchers around the state at five state meetings, and individually met with 36 of these to ask for data contributions. Reports for 198 projects pertinent to the data catalog were scanned to.pdfformat, and a file containing the Project Information was developed. Project Information consists of the pertinent dates, publication notes, an abstract, and other information that describes the project. Abstracts were written for more than 100 projects that lacked abstracts in their final reports. These digital data have been archived in the WebDAV data_catalog. Electronic backup copies were made for the initial set of project files and these are stored in four separate locations - two on the University of Oklahoma campus, one at the Oklahoma Biological Survey and one at the Oklahoma Department of Wildlife Conservation. The paper reports and files were boxed and consolidated into one OU storage facility that was deemed to be the safest location we have available. The OBS WebDAV application will be deployed for restricted write access (requiring a username and password). Read permission will be open to all users. The URL is www.biosurvey.ou.edu/data catalog. Sensitive data such as the precise locations of rare or endangered species are incorporated into the ONHI database but generally are not made available to the public via the WebDAV site to protect those populations or individuals.

H. PREPARED BY: Ian Butler Oklahoma Natural Heritage Inventory, University of Oklahoma I J. APPROVED BY: ~2~ Wildlife Division Ad lllistratlon Oklahoma Department of Wildlife Conservation..---:- Stafford, Federal i ordinator oma Department of Wildlife Conservation