Charter for Internal Referrals: Collaborative Planning Principles

Charter for Internal Referrals: Collaborative Planning Principles
Slide Note
Embed
Share

This charter outlines how [Council Name] statutory planners partner with expert teams to guide planning applications, focusing on principles such as customer-focused collaboration, continuous improvement, and clarity. Teams work together to provide a positive applicant experience while ensuring long-term community benefits through efficient internal referrals and inter-departmental cooperation.

  • Charter
  • Internal Referrals
  • Collaborative Planning
  • Customer-Focused
  • Continuous Improvement

Uploaded on Mar 16, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. IT Development Initiative: Status & Next Steps Tom Jackson Vice Chancellor of Information Technology and Chief Information Officer Campus IT Forum November 28, 2018

  2. IT Development Initiative Agenda Agenda IT Development Initiative Information Resources Inventory Data Governance and Resource Risk Classification Security Education Technology Update IT Audit Preparation Next Steps 2 ncat.edu

  3. IT Development Initiative IT Development Initiative

  4. IT Development Initiative IT Development Initiative IT Development Initiative ISO Standard > Policies, Operating Standards and Baseline Procedures Information Security Management > Projects to address IT security Compliance > Information Security Assessments Staffing and Organization > Filling IT leadership positions > Technology and staff consolidation 4 ncat.edu

  5. ISO Standard ISO Standard ISO Standard Governance > Enterprise Applications Governance formed > Information Security Advisory Committee formed > Information Security Incident Response Committee > Academic/Client Advisory Committee to be formed Winter 2019 Policies > Information Security Policy Updated November 16, 2018 > Appropriate Use Policy adopted November 16, 2018 Operating Standards > Incident Respond Standard developed and in use > Access Control Standard developed > Endpoint Security, Server Security and other standards under development 5 ncat.edu

  6. Information Security Management Information Security Management Information Security Management Projects > Eleven (11) completed, thirty-two (32) in progress or pending Vulnerability Scanning > Third scan in progress > Scan results have identified remediation projects Remediation Projects > Two (2) completed, five (5) in progress or pending > Projects added as issues identified Penetration Testing > Began in November 6 ncat.edu

  7. Information Security Management Completed Project Accomplishments Completed Project Accomplishments Security Projects > Perimeter firewall upgrade > Virtual Private Network (VPN) upgrade > Core fiber loop > Second NC-REN connection > Craig Hall core switch migration Vulnerability Scanning > Third scan in progress Remediation Projects > CHHS server > Employee Domain 7 ncat.edu

  8. Information Security Management In Progress In Progress Remediation Projects > Banner database security > Wendover endpoints > Campus A/V systems > ITS servers Network Security > Network switch upgrade > Network Access Control (NAC) > Network device configuration management software Security Education > KnowBe4 Training > Data Stewards Training Office 365 Multifactor Authentication 8 ncat.edu

  9. Compliance Compliance Compliance Resource Inventory > Initial collection began with information security assessments Information Security Assessments > Performed annually on each unit that manages technology > First round o Twelve (12) divisions and colleges assessed in 2018 o Seven (7) divisions will be completed in January 2019 > Assessments will flow into Information Security Program > Reports and Roadmaps will provide guidance for compliance Information Technology Risk Assessment > Spring 2019 9 ncat.edu

  10. Compliance Information Security Assessments Conducted Information Security Assessments Conducted Athletics Bluford Library Business & Finance Enrollment Management Human Resources Information Technology Services Strategic Planning and Institutional Effectiveness Student Affairs College of Agriculture & Environmental Science College of Engineering College of Science & Technology Joint School of Nanoscience and Nanoengineering 10 ncat.edu

  11. Staffing and Organization Staffing and Organization Staffing and Organization Leadership Positions Filled > Director, Client Technology Services > Director, IT Project Management and Business Operations > Director, Network and System Administration Hiring in Progress > Associate Vice Chancellor for Data Governance and Business Intelligence > Director, Enterprise Applications > Associate Vice Chancellor for Information Technology and Deputy CIO 11 ncat.edu

  12. Staffing and Organization Staffing and Organization: Consolidation Staffing and Organization: Consolidation College of Health and Human Sciences > Consolidation in progress o File services migration o Domain migration o Workstations > Consolidation pending o Staff 12 ncat.edu

  13. Information Resources Information Resources Inventory Inventory

  14. Information Resources Inventory Information Resources Inventory Information Resources Inventory Resources > Data > Hardware > Software Must be maintained maintained by division, college or department > Provide regular updates to ITS Some inventory collected for information security assessments Remaining inventories to be collected Winter 2019 14 ncat.edu

  15. Data Governance and Data Governance and Resource Risk Classification Resource Risk Classification

  16. Data Governance and Resource Risk Data Stewardship and Classification Data Stewardship and Classification Data Classifications > Added to Information Security Policy > Determine the risk level of resources Resource security based on risk > Basic level for all resources > Additional security for resources with confidential or sensitive data Standards > Data Governance > Risk Management Planned for Spring 2019 16 ncat.edu

  17. Security Education Security Education

  18. Security Education Training Training Mandatory for all employees General training for all employees Specialized training > System Administration > Application Administration > Data Stewardship KnowBe4 training software Begins in Winter 2019 18 ncat.edu

  19. Technology Update Technology Update

  20. Technology Update Technology Update Technology Update Banner 9 Admin Pages in production Banner 9 Self Service starting Winter 2019 Banner Document Management in production in seven (7) departments Web Site redesign underway > Planned go-live summer 2019 Network access layer upgrades > Network Access Control (NAC) and configuration management Classroom and computer lab updates 20 ncat.edu

  21. IT Audit Preparation IT Audit Preparation

  22. IT Audit Preparation Audit Preparation Audit Preparation Identify risks Prioritized plan to address risks Show progress towards addressing risks 22 ncat.edu

  23. IT Audit Preparation Identify Risks Identify Risks Information Security Assessments Information Security Assessments Based on ISO 27002 international standard Resource Inventory Completed 12 Assessments, 4 pending Several Processes In Place > Immature > Need documentation > Need addition staff training in processes 23 ncat.edu

  24. Next Steps Next Steps

  25. Next Steps Next Steps Next Steps Continue development of governance Continue creation of policies, standards and processes Complete first round of information security assessments Complete current projects Develop multi-year roadmap > Finalize after division and department assessments > Align with strategic plan and strategic priorities > Align with enterprise risk management plan 25 ncat.edu

  26. IT Development Initiative Status and Next Steps Questions? 26 ncat.edu

Related


More Related Content