Departmental Security Administrator (DSA) Training Overview

Slide Note

The roles and responsibilities of a Departmental Security Administrator (DSA) and how to become one. Discover how DSAs assist new employees with self-registration and access to core data systems.

Uploaded on Dec 21, 2023 | 1 Views

Departmental Security Administrator (DSA) Training Overview

PowerPoint presentation about 'Departmental Security Administrator (DSA) Training Overview'. This presentation describes the topic on The roles and responsibilities of a Departmental Security Administrator (DSA) and how to become one. Discover how DSAs assist new employees with self-registration and access to core data systems.. Download this presentation absolutely free.

Presentation Transcript

  1. Departmental Security Administrator (DSA) DSA TRAINING OVERVIEW

  2. So you want to become a DSA?

  3. What does a DSA Do?

  4. What Are the Roles of a DSA: Acts as ITS Security Administration contact for the department. Informs employees about self registration. May resolve problems so employee can self-register. Assigns appropriate access within AccessLink. May reset an employee s password when an employee cannot. Terminates an employee s Business Systems Account when they separate or transfer to another department. This includes Temporary Employment Service Employees. Answers employee questions about access to data systems, training, data security, and logon procedures.

  5. DSAs Assist New Employees with Self-Registering with Single Sign-On: New employees are entered into UCPath You are notified by your department s HR Personnel through your department s Onboarding Process. The new employee gets a UCSD email account (like You will notify the new employee to self-register with Single Sign-On to receive their Business Systems Account

  6. LINK to Self-Registration Page:

  7. You Will Request Access to Core Data Systems for the New Employee: The Supervisor, Manager, MSO, etc. will notify you of what access the new employee needs. For example: ISIS, TritonLink, CAMS, etc. If the employee needs access to student data you will need to notify them that they need to complete FERPA Online Training through UC Learning Center first. You will go to AccessLink ( to submit requests for access to core data systems, like ISIS and TritonLink.

  8. In AccessLink under the Facility Tab you will mainly request access where the red arrows are:

  9. Employees Using Core Data: Self-Register Reset their own Password Read and Sign the Computer/Information Use and Security Statement Understand and Follow University Policies for Core Data Access, Use and Security Review Information About Security Find Department s DSA If needed, request Business Systems access from DSA

  10. Does a DSA have Any help?

  11. There Are Many Security Participants: Data Stewards DSA ITS Security Administration ITS CORE DATA Department Management Audit and Management Advisory Services Campus Central Offices Employees Using Core Data

  12. Data Stewards Data Steward are the Owners of core data. Decide which data should be restricted and unrestricted. Grant or deny workflow to access restricted systems/data. You can look up Data Stewards in AccessLink.

  13. ITS Security Administrators Processes AccessLink workflow requests Processes DSA appointment forms Answers DSA questions about AccessLink, Core Business Systems , and Data access and security. Sets up special access to Core Systems & Data per Data Steward instructions.

  14. Audit and Management Advisory Services Conduct department audits to ensure compliance with university policies Investigate Core Data access and security violations Sometimes referred to as Campus Audit

  15. Campus Central Offices Train employees to use core Business Systems and core Business Systems data Provide a help desk for the business functions

  16. Roles of Departmental Management: Appoints DSA(s) Decides which employees need access to core data Instructs DSA to obtain access When employee job responsibilities change, reviews access needs Ensures that DSA performs all required tasks Handles data security violations reported by DSA

  17. What Tools do DSAs Use? AccessLink ( is one of the primary tools a DSA will use. DSA Search MyAffilliates in AccessLink DSA Documentation in AccessLink DSA Utilities in AccessLink

  18. AccessLink Documentation:

  19. AccessLink Utilities:

  20. Departmental Security Administrator (DSA) Handbook: To access it you will need to log in with your AD userid and password. The link is in Documentation. The handbook is in the process of being updated.

  21. Business Systems/ Link Family

  22. New Accounts Data in Documentation on AccessLink:

  23. How does a person get an account? Campus Email Affiliates Database Student DB RACFID

  24. If You Dont See a RACFid and an Actions Tab It Means That This Individual Has Not Yet Self-Registered

  25. Many times not known by person signing on. RACF ID = Userid = Account Example BIODFR Example ITSTNC Prefix Initials

  26. Individuals with Multiple User IDs: Watch for multiple userids within the Facility or RACF tabs of ALTNG Make sure you update the correct account Make sure user logs on with the correct account for your department and not with their email address. ACDTNC SYSTNC

  27. Are there any Forms I need to be aware of?

  28. DSA common forms: ms.html

  29. DSA common forms: Computer Use and Security Statement Form - For Employees & For Affiliates Computer Use and Security Statement Form - For Affiliates DSA Appointment Form Data Steward Authorization Form

  30. What are Security Violations?

  31. Data Security Violations: Employee using another employee s userid Userid not terminated after employee left the department Passwords written down or shared No computer/information use and security statement signed by employee Downloaded restricted data not properly protected or stored Information not accessed for legitimate University business

  32. Terminating Accounts: Terminate a user s account after they separate or transfer to another department. If they are a DSA submit a DSA Appointment Form first to remove them as a DSA. Once you receive notification that they have been removed as a DSA, then terminate their account.

  33. QueryLink Queries

  34. Access Needed to Connect to Querylink Queries:

  35. BI Tools is going to be replacing QueryLink: l

  36. ITS Service Now Support Portal:

  37. Contact Information: ITS Access Provisioning: Teresa Crespino (858) 534-9819 Isaac Ostendorf (858) 246-0300


More Related Content