Center for Information Technology Services

CITS Project Updates

Did You Know...?

Please Visit Our New Page for information on CITS Services of which you may not be aware.

We will continue to highlight Services each month.

Current Projects

  Title  Summary  Target  Status

Affiliated Information Security Collaborative

Contact: Fred Smith



An enterprise Security Plan and Assessment, called the Affiliated Information Security Collaborative, has been developed by the CIOs and IT Leaders (UMB CIO, School IT Leaders, and the CIOs of the UM Medicine IT Network (SOM, FPI, and UMMS).

The leadership of the Collaborative has taken responsibility for establishing and administering an Information Security Program that adheres to Federal, State, University, and other mandatory security rules, requirements and guidelines in order to protect the confidentiality, integrity, and availability of data.

More Information is available by clicking here. 

This plan has been developed, approved, and is being implemented.

 

Underway

Audits
(USM & Legislative)
Contact: Fred Smith

Enterprise systems, communications, & networks constantly audited for best practices. 

CITS is reviewing/implementing recommendations from previous Legislative Audits. USM auditors have reviewed our progress.

Managing Quarterly Vulnerability Scans

Preparing for Fall 2014 OLA engagement by implementing additional security functionality.

These are all ongoing activities of the Security and Compliance OfficeThe USM audit review is complete with no issues to resolve.  Preparations for the Office of Legislative Audits engagement, scheduled for September, are underway.
IT Security Assessment
Contact: Fred Smith
A Security Assessment will be completed for all areas of the campus. Details of the assessment program can be accessed below by clicking on the title to the left.

See Order of Central Office Assessments Below

The program began on June 1, 2014 and a security assessment for most central services will be complete by Fall 2014.

The IT Security Program

Contact Fred Smith

The program will have an impact on nearly every person on campus. Among the changes of which everyone must be aware:

The security enhancements that have been made are complying with audit requirements and are improving the protection of UMB information assets. They include:

1. Replacing machines running the Microsoft XP operating system. This operating system is no longer supported by Microsoft and security updates are no longer available. Machines running the XP operating system are vulnerable to many exploits.

2. Changing password expiration dates:

a. USM security program requirements include a 90 day password expiration for any “highly privileged user”, which are individuals who have IT roles and job classifications, and can make changes to servers and systems.

b. All other (General) users will now only have to change their passwords once per year.

3. Requiring highly privileged users to access central enterprise systems via a secure Virtual Private Network (VPN).

4. Requiring highly privileged users to use multi-factor authentication to access central enterprise servers and systems. This involves using an ID and password and then a pin number that will be supplied to the user.

5. Restricting administrative rights to University computers which are used to access central enterprise systems, i.e., the ability to download software to University owned machines that access central systems will only be granted to highly privileged users (IT personnel).

This plan has been developed, approved, and is being implemented.

Implementation of the program is occurring.
Kuali
Contact: Doug Bowser

Kuali Coeus is the next evolution of an electronic research administration system.  It allows UMB to stay on the cutting edge of electronic grant submission by facilitating:

1.    Online proposal preparation.
2.    Electronic routing of proposals and approval process
3.    Tracking proposals as they move through the routing  process
4.    Electronic submission to Grants.gov
5.    Faster overall approval process

UMB is one of the first institutions to implement this new system.

Campus-wide Availability: August 25, 2014

ORD began using Kuali on August 18, 2014.  It became available to the campus on August 25, 2014.

Complete!

Electronic Personnel Action Forms (ePAF)

Contact: Mike Smith

The electronic Personnel Action Form replaces the Employee Action form and is used for three actions:

1.     Hire/rehire/transfer/concurrent
2.     Job change, and
3.     Status change

There is an approval process and workflow that allows all work to be done online.

Fall 2014A successful pilot has been completed. Rollout is on target.

Unified Directories
Contact:  Brian Coats

Will connect and unify the campus Enterprise Directory and the campus Active Directory so users can use their UMIDs to log into their workstations, the network, and campus applications and services.  It will also significantly streamline the administrative overhead for all associated accounts.

This enables creation of federated identity management relationships with SOM, FPI, UMMS, and the campus.

Student Registration for the School of Public Health, an MPower Initiative:  Summer

A Federated ID process was created to support the School of Public Health course registration.  This MPower project allows students from College Park and UMB to use their local IDs to register for courses at the other campus.

Complete!

UMID for Campus Applications


Contact: Brian Coats

CITS is using Shibboleth to enable campus applications to use the UMID.  As new systems come online they are "Shibbolized".

TerminalFour: Summer

Kuali: Summer

UMB Community System: Summer

TerminalFour: Complete!

Kuali: Complete!

Community System: Complete!

Community System

Contact: Brian Coats

Phase I: Provides replacement for the eUMB Affiliate System to create identities for persons in roles that are not faculty, staff, or students. Provides a simplified sponsorship process and an electronic workflow.Summer 2014Complete!
Phase II: Allows persons to Self-Register in the Community System in order to be sponsored by an apprpriate authority and be added to the enterprise directory.Spring 2015On Target

Terra Dotta Risk Management System
Contact: Mike Smith

Terra Dotta is a system to collect and make available accurate, real-time data on the whereabouts of University affiliated international travelers at any point in time. The sole use of the information is in time of emergency.To put a secure, accessible system in place by late Fall 2014.On target to deliver this system in late fall of 2014.

Site Executive (CMS) content migration to TerminalFour (new CMS)
Campus Contact: Amir Chamsaz
CITS Contact: Trisha Kaufman

Moving content from SiteExecutive to TerminalFour will make the new web environment more searchable, accessible, and will display new branding templates consistently throughout the site. CITS is participating in this project, led by Communications and Public Affairs, to pilot the move of CITS content and then to assist in moving all current web content to the new TerminalFour content management system.

Pilot project to migrate content is nearly complete.

CITS content will be migrated to a new site by September 20, 2014. 

SON went live August 4.

All sites previously using the old content management system will be migrated by 9/30/2014

New fiber, Howard Hall
to 620 W. Lex.
Contact: Zia Mafaher

This will allow CITS to place a second network hub at 620 W. Lexington St., making network downtime less likelyPlanning Now: 1st cabling: Summer 2015Planning Phase
The Institute Applications
Contact: Trisha Kaufman
CITS' custom web development team is creating a number of web-based applications for the School of Social Work's Institute for Innovation and Implementation in support of their research in best practices for interventions for children in need and in support of the professionals in the field.A Virtual Training Center for Practioner TrainingVTC is complete, but adding more clients/programs
A National Technical Assistance and Reporting NetworkTargeted for October 2014
Early Childhood Mental Health Consultation Outcomes MonitoringRelease 3.0 Targeted for
September 24, 2014
SEFELMaryland Social Emotional Foundations for Early Learning
SEFEL Website Redesign
Target: Go Live in September 2014SEFEL went live on August 21, 2014.  This was earlier than projected.  Complete!

VoIP Implementation/ Upgrade
Contact: Zia Mafaher

Will replace 95% of campus phone infrastructure with Voice over IP, which offers many new featuresThe typical 600 Installations Per Year has been targeted to increase to 1,000 per year. See below for the short term schedule.This is an aggressive goal, but we plan to complete 1,000 installations this fiscal year.

Campus Network Refresh
Contact: Zia Mafaher

This will standardize network equipment across campus, which will make it easier and less costly to maintain and refresh the campus network.Planning StageWill begin in FY 2015.

Migration of FM & EHS
VMs to CITS VM environment

Contact: Vicky Hunter

Moving of central administrative computing environments to CITS' VMware environments. This will improve availability, share resources, and cut costs.August 2014This is on hold until new storage is acquired, installed, and configured.

CITS Communications
Contact: Chris Phillips

It is important to let all campus constituencies know the status of our high priority projects and how the projects will affect users. Regular articles in the Elm and IT News are produced to explain our current services and planned new services.  We will highlight important IT related topics or events, such as the recent Cybersecurity Awareness Month.  We will notify the University community of any possible service disruptions. A monthly electronic message will summarize progress on priority initiatives.

Creating "Did you know...?" site.

Completed the end of July, 2014!

Developed Communications for Affiliated Security Collaborative, Vibe, The ELM, Laurels, CITS' events.Completed in June and July 2014!
Highlighted Completed Projects

New Projects Updated in this site now.

Migration of Medical Alumni Association Records to the Campus Advance system

Contact: Roger Pederson

This is a project to migrate the fund raising and demographic data in the Medical Alumni Association's record system into the enterprise Advance system maintained in the University Development Office. CITS assisted in this project.Fall, 2014

Completed and Data Verification is Underway! 

Recently Completed Projects

Exchange 2010
Contact: Vicky Hunter

All CITS users were migrated. Additionally, the following number of mailboxes have been migrated:

Dental-Completely Migrated;
HSL-Completely migrated;
Pharmacy-Completely migrated;
Social Work-Completely migrated;
Law-1100 migrated, 101 to be migrated.

In the Campus Domain 5,436 mailboxes are completely migrated (98.2%) and 101 mailboxes still are to be migrated to Exchange 2010.

The project is substantially complete.

Expand UMID Single
sign-on for ColdFusion Applications

Contact: Brian Coats

All CITS developed applications are already being adjusted to use the UMID and password for authentication. This project will create the capability for users to sign-on once to access all web applications that they are authorized to use. The first phase will address 90% of the applications.

Phase I: Pilot February 2014

Complete!

Phase II: all applicationsPhase II Complete
Phase III: Anomalies September 2014Remaining Five Applications Require Custom Approaches: In Progress

ECMHCOMS

Contact: Chris Phillips

Early Childhood Mental Health Consultation Outcomes Monitoring System
Part of the Insititute for Innovation and Implementation
Multiple Release Dates

Release 2.2: February 10, 2014
Release 2.3: April 8, 2014
Release 3.3: Early Fall 2014

EIR

Contact: Chris Phillips

Early Identification of Risk Data Collection Tool
Part of the Institute for Innovation and Implementation

Release 1 System Test EnvironmentJune 25, 2014

Review Board is Currently Testing the System

CITS PRIORITY PROJECTS

Descriptions and Other Information

Affiliated Information Security Collaborative

The primary objectives of the Program are to:

  • Collaboratively assess, identify, and report on any information security risk or vulnerability;
  • Define common areas of risk as they relate to information security at appropriate operational intersections;
  • Share information security strategies, processes and practices that adhere to local, state, and federal regulatory rules and requirements in order to avoid duplication of effort;
  • Share technology platforms and information security knowledge among technology professionals in order to broaden knowledge and expertise;
  • Collaborate on the improvement and strengthening of information security policies, practices, and solutions, and ensure coverage across the enterprise;
  • Develop a global communication strategy to promote and expand information security awareness across the UMB affiliated enterprise.

Here is a more complete description of the Program.

Top

Audits (USM and Legislative)

Summary: The Office of Security and Compliance is tasked with assuring that UMB continues to meet the requirements of legislative and USM auditors.  The campus is subject to regular audits by the USM Internal Audit (IA) and the Office of Legislative Audit (OLA).  Their purview covers all central systems and applications deemed critical to the University's mission as well as disaster recovery and patch and vulnerability management.

Targeted Go-Live Time Period: The OLA audits are performed every three years and the USM audits occur as a follow up to the OLA audits as well as additional audits the OLA deems to be necessary. Network Vulnerability Scans are run every month and are reported on a quarterly basis. A USM follow up audit began in January 2014.  The next OLA audit is scheduled to begin in fall 2014.

Primary Deliverables:

  • Blackboard audit completed
  • Implementing and reviewing ISA recommendations from previous OLA audit
  • Managing Quarterly Vulnerability Scans
  • Updating USM Guidelines in Response to the State IT Security Policy is complete
  • Proactively preparing for Fall 2014 OLA engagement by implementing additional security functionality

Groups Participating in the Project: CITS Security, Infrastructure, Directory Services, and Enterprise Applications units.

Benefits to the Campus/Link to the Strategic Plan: Compliance with State and USM security guidelines for maintaining security of sensitive campus information. This helps to maintain the integrity of campus programs.

Top

IT Security Assessment

The UMB campus Chief Information Officer and the Information Security Officer have been meeting with the CIOs and IT Leaders in the schools and UM Medicine affiliated partners to develop a plan of action.  This enterprise-wide plan of action (both short-term and long-term) has been completed.  It will include the activities being performed in the FPI, the SOM, and in the other UMB schools.  The UMMS is also engaged in these discussions and activities. This plan was developed in May, 2014.

Office of Security and Compliance Assessment Plan (to be incorporated into the Affiliated Information Security Collaborative Plan).

The following sequence of activities will be used in performing an information security risk assessment as well as conducting pre-implementation control reviews for new systems:

I.    Identify critical assets in central units, starting with departments that manage student, financial and human resources data, and collaborating with the IT leaders in schools and departments to undertake an assessment in those areas.

II.   Apply UMB data classification category for each data asset

  1. Level 3 - highest risk data, systems and applications or services that have externally mandated IT compliance requirements such as those constraining information covered by HIPAA or PCI.  Failure to comply with these externally mandated IT Security requirements would result in serious financial, legal and/or reputational harm to individuals and/or the University.
  2. Level 2 – Critical data, systems, applications or services related to or supporting the commitment or management of UMB financials, student data and those systems containing sensitive information (i.e. name, SSN or other combination or personal identifiers) which if compromised could be used to commit identity theft.
  3. Level 1 – Data intended for internal University use.  Applications or services that support academic instruction, research data or general communications that do not contain sensitive information.
  4. Level 0 – Non-critical data (i.e., public directory information).  Data explicitly or implicitly approved for distribution to the public where there is little institutional risk associated with this system due to security.

III.  Run a network scan to identify any existing vulnerabilities with servers or computers in the department, e.g., are security patches and anti-virus programs up-to-date?

IV.  Install a forensic program on servers and computers to determine if they contain sensitive data, e.g., SSNs. 

V.   Check the network and server/computer configuration and firewall rules to determine if the currently assigned security restrictions meet or exceed minimum standards based on the data classification.

VI. Review information security processes and procedures with the unit.

VII. Risk/Vulnerability Assessment – in this phase of the assessment, an investigation of data vulnerabilities will be undertaken using the checklist below.  This assessment will be completed with guidance and direction from the Chief Information Officer and Information Security Officer.  The assessment outcome will be reviewed by the Information Security Officer to determine appropriate risk mitigation for the Central based applications under review by CITS. A report of the findings from the assessments conducted by the UM Medicine IT Network will be shared with the CIOs and the Information Security Officer, as needed and appropriate.

  1. Identification and Authentication
    • Does the unit’s use of passwords adhere to USM guidelines (number of characters, complexity, aging, account lockout)?
    • Are password protected screensavers used?
  2. Account Management / Access Controls
    • Is there a method for authorizing new accounts and removing old accounts?
    • What is the process for checking/verifying authorized users and roles?
    • How often are access control lists reviewed?
    • Is there a process to limit access based on job function and/or roles?
    • Are individuals given only the access needed to do their jobs?
  3. External Connectivity
    • Does a unit, users within the unit, use external connectivity (wireless, remote desktop, VPN), to get access to University data?
    • If so, is the remote computer protected with an anti-virus program?
  4. Virus Protection on University owned machines
    • Does a user have administrative rights to install/change programs on their computer?  
    • Is virus protection installed?
    • How often are definitions updated?
    • Are updates completed automatically?
    • Are computers turned off regularly so that virus protection programs can be installed?
  5. Contingency Planning / Backups
    • How often are backups performed on unit specific machines?
    • Are there procedures to restore the system if it fails?
    • Who can restore the system?
    • How long would it take to restore the system?
    • Where are backups kept?
    • Is there a contingency plan that includes continuity of operations?
    • Have the backup procedures been tested?
  6. Maintenance
    • Has the system been hardened with security software installed?
    • Have all applicable security patches been applied?
  7. Media Sanitization / Disposal
    • Are data considered sensitive?
    • What method is used to dispose of sensitive data (DoD overwrite, degauss, incinerate, physically destroy, shred)?
  8. Physical Environment
    • Are the servers protected in a locked environment with secure access controls? What about hardcopy files with sensitive data?
    • What type of access is required?
    • Are the systems protected against environmental threats (water, fire)?
    • Are the systems protected with a UPS on emergency power?
  9. Personnel Security
    • Have users read the acceptable use policy?
    • Do contractors have access to the system?
  10. Cloud Services Security
    • Does the unit use any cloud service?
    • If so, has the service been certified as being secure?
  11. Mobile devices
    • Does the unit authorize the use of mobile devices?
    • Are there any sensitive data being stored on the mobile devices?

VIII. Analysis of the Data - the Information Security Officer will analyze all of the information collected to determine the actual risk to the critical assets and propose appropriate mitigation for any areas identified as weak or procedures not implemented. 

IX.    Report – a report will be prepared that will be shared with the Chief Information Officer and Vice President (CIO/VP) and University Leadership.  The report should include findings; a list of assets, threats and vulnerabilities; a risk determination, recommended controls, and a cost benefit analysis.

Short Term Timeline

As indicated above, the central units that will be reviewed first are departments that manage student, financial and human resources data.  They are:

  • Registrar 08/11/201414 - 08/29/2014 - Complete!
  • Institutional Research and Accountability - Fall, 2014
  • Financial Aid 09/01/2014 - 09/19/2014
  • Financial Services 09/22/2014 - 10/10/2014
  • Human Resources Services 07/21/2014 - 08/08/2014 - Complete!
  • Financial Services - Fall, 2014
  • Sponsored Projects Accounting and Compliance - Fall, 2014
  • Public Safety - Fall, 2014
  • Parking Services - Fall, 2014

The target date for completing the assessment of these units is Fall 2014. 

Primary Deliverables:

  • Assistance to Campus Legal and HR Offices with forensic investigations.
  • Assist campus with incident response
  • Working with CITS Datacomm for implementation of new border firewalls
  • Oversee destruction of hard drives containing sensitive information before disposal or recycling
  • Creating Classification Schema that ensures all data is stored with an appropriate level of security
  • Assisting Schools  and Departments in meeting HIPAA, FISMA, and PCI/DSS requirements
  • Building a robust information security program,
  • Preparing for future reporting and audit requirements,
  • Responding to audit findings and improving the overall security posture of the University.

Groups Participating in the Project: Office of Security and Compliance and any school or department that has been identified to have sensitive data requiring oversight by the IT Security Program.

Benefits to the Campus/Link to the Strategic Plan: Protecting the confidentiality, integrity, and availability of critical information assets.

A slide show of important information about the Collaborative is available by selecting this link.

Top

Kuali

Summary: Kuali replaced Coeus as the campus-wide application for research proposal submission and post-award reporting.  In addition to removing reliance on a small group at MIT to maintain the software, Kuali provides a more modern (totally web-based) platform.

Primary Deliverables: Replacement of Coeus with Kuali

Groups Participating in the Project: 

This project was led by Dennis Paffrath, and the leadership team included Doug Bowser and Janet Simons.  Many individuals from central departments, schools and CITS contributed to implementation success by serving on implementation working groups, including testing and/or training.  The list of individuals who contributed can be found on the Kuali Coeus website.

Benefits to Campus/Link to Strategic Plan:

  • Better (web-based, open source) platform for modern technology
  • Ability to submit proposals online to Grants.gov and Research.gov
  • Removing the Java client requirement on users' computers
  • Ability to link with other ERP systems on campus (e.g., Cicero)

Top

Electronic Personnel Action Forms (ePAF)

These forms replace a manual, paper driven system for entering and approving personnel actions.  The forms are online and are routed by a workflow system along an approval path for each department.  There are three types of ePAFS:

  • Hire/rehire/transfer/concurrent
  • Job change
  • Status change

The data entered loads directly into eUM HRMS
The system does a lot of the work formerly required of office staff
The approval process can be tracked online

An ePAF can only be created by an authorized initiator. Then, depending on the department structure, the ePAF will go through up to 3 approval levels before being forwarded to HR for final processing.
At least two people must review an ePAF, meaning there must be an initiator and at least one level of approval.

Important Dates:

May 2014: Pilot group began to use ePAFs in their departments as a test
September 2014: Go-live to the rest of the campus
November 2014: Paper forms will no longer be accepted.

Top

Unified Directories

Summary: UMB has made a significant transition over the last several years to a common username and password [UMID] for web applications and campus services.  One of the remaining steps in this common ID initiative includes how users log into their workstations and the network.  The ultimate goal is for users to be able to use a single ID, whether it is the UMID, a SOM ID, a Hospital ID, or an FPI ID for authentication into electronic resources in which they have privileges.

Targeted Time Period: This is a multi-year project that encompasses multiple directories and authentication systems spread across all the University schools and departments. The first phase of this project will be implemented in Winter 2013/4. This phase will unify the campus Enterprise Directory with the campus Active Directory used by persons in the Campus domain.  Subsequent phases will include the creation of a federated identity management environment and includes the School of Medicine, other Campus units not in the Campus domain, UMMS, and FPI.

Primary Deliverables: A single ID that can be used to log into all enterprise web applications, services, networks, and workstations.

Groups Participating in the Project: Directory Services, Infrastructure Services, IT Help Desk, and various School/Dept technical staff. SOM, UMMS, FPI technical staff will join as the phases for their federated IDs begin.

Future Enhancements:

  • Implementation within the Campus domain will enable federating campus sites with the directories of the School of Medicine, FPI, UMMS, and any other directories managed by members of the UMB Community.
  • This will allow all faculty, staff, and students to use one ID to access any system, desktop, or function to which they are entitled that is provided by any of the entities of the UMB Community. 
  • This will be a very large project that will take a while to complete.

Benefits to Campus/Link to Strategic Plan:

  • Expand the use of a single ID for a more simplified, enriched electronic experience for UMB information technology users.

Top

Expand UMID: Single Sign-on for ColdFusion Applications

Summary: The Web Services Office has developed and maintains more than one hundred web applications written in ColdFusion. This summer all but five of these applications have been adjusted to use the UMID for logging on. Additionally, as new systems come on line, Directory Services configures them to use the UMID for authentication. Three new systems that were UMID-enabled this summer were:

1. TerminalFour, the new Content Management System for building and maintaining websites.

2. UMB Community System, which replaced the Affilitate System for creating accounts for new workers.

3. Kauli, the system replacing Coeus for entering and tracking research proposals.

Additional systems that will be configured to use UMID and Shibboleth for single sign-on are:

1. Illiad (HS/HSL Library) completed August 25, 2014.

2. Advance (Development): Early Fall, 2014

3. Terra Dotta (Internation Travelers application): Late Fall, 2014.

4. TOPAZ (animal testing): Fall, 2014

5. TK20 (SSW Reaccreditation): Fall, 2014.

Primary Deliverables: Single Sign-on using the UMID now exists for nearly 200 different systems at UMB. Directory services will continue to enable UMID for all future systems.

Top

Terra Dotta Risk Management System

Summary: Terra Dotta is a system to collect and have available accurate, real-time data on the whereabouts of University affiliated international travelers at any point in time. The sole use of the information is in time of emergency.  All international travel for University related purposes by University affiliated individuals must be registered in the travel registry prior to travel.

Targeted Go-Live Time Period: Late Fall 2014

Primary Deliverables:

  • Web interface to off-site host
  • Real-time reporting
  • Facile self-registration process
  • Can process groups of travelers in batches
  • Integration with UMB’s specific insurance and emergency evacuation providers
  • Insurance information sent to registered travelers automatically upon registration
  • Customizable security with different, assigned access privileges by role.
  • Ability to identify multiple legs of a single trip so travelers’ whereabouts are known at all times
  • Geographic map display of travelers’ whereabouts based on location at a given time
  • Easy availability of important information at any time via the Internet
  • Customizable e-mail capability
  • Ability to edit itinerary at any time
  • Mobile device access to the system by travelers

Technical Requirements:

  • Meets security checklist of requirements for UMB offsite hosted computing
  • Exclusively uses SSL encryption for all communications over the Internet
  • Interface feeds from campus enterprise systems
  • Capable of authenticating users via UMB’s LDAP Identity Management System
  • Uses UMB’s UMID
  • Shibboleth enabled to provide single-sign-on capability
  • Integration with UMB’s Exchange Outlook e-mail systems for mass/selective communications
  • SMS/Text messaging capable
  • Workflow management and electronic approval capabilities

Groups participating in the project:  Academic Affairs, CITS, Office of Research Development

Benefits to the campus: knowing the whereabouts of all UMB affiliated international travelers at all times in order to ensure the security and safety of all travelers in the events of a natural disaster, civil unrest, or other crises that could impact people in travel status.

Top

Site Executive Content Migration to TerminalFour

Summary: The campus is replacing the current web content management system (Site Executive) with a more contemporary system: TerminalFour.  CITS will assist Communications and Public Affairs in migrating all active data from Site Executive to the new system while improving indexing, tagging, and accessibility of the content.

Targeted Time Period: This required training of three Web Development team members in December 2013.  Migration is targeted for completion by September 30, 2014.

Primary Deliverables:  Replacing an old, inflexible system with TerminalFour. A virtual cloud infrastructure spanning two data centers.

Groups Participating in the Project: CITS Web Development Team, Communication and Public Affairs, Website Administrators from Academic Affairs, SOD, SOL, SON, SOP, and SSW.

Benefits to Campus/Link with the Strategic Plan:

  • Better and consistent branding on campus websites
  • Improved availability of information to campus, the public, and targeted groups
  • More flexibility in meeting surge demand (e.g., Severe Weather)
  • More accessibility for persons with disabilities
  • Responsive sites for all mobile devices
  • More integration with custom applications
  • Eliminate the need for maintaining campus infrastructure for campus websites
  • This will support the communications theme in the Strategic Plan

Top

New Fiber from Howard Hall to 620 W. Lexington Street (Network Redundancy Project)

Summary: The Campus Network Core Switches, both primary and secondary, are currently located in Howard Hall.  This project will move the secondary/redundant core to the 620 W. Lexington Street building to ensure network availability in the case of a disaster.

Targeted Time Period: This project is currently in the Planning Phase with fiber cable installations scheduled to begin in Summer 2015.

Primary Deliverables: Network redundancy so that the campus could absorb a disaster at a network core site without end users losing access to the campus network or the commercial or research Internet.

Groups Participating in the Project: CITS' Data Communications office will be working with Facilities management on HVAC capacity planning.  Outside vendors will provide electrical upgrades and assistance in providing and installing fiber cable. Eventually CITS will coordinate the network equipment move with all campus schools and departments.

Benefits to Campus/Link to the Strategic Plan:

  • Quick disaster recovery in the event of a fire, flood, or power outage at Howard Hall.

Top

Applications for the Institute for Innovation and Implementation

CITS' custom web development team is creating a number of web-based applications for the School of Social Work's Institute for Innovation and Implementation in support of their research in best practices for interventions for children in need and in support of the professionals in the field. Some of the applications under development:

Virtual Training Center: This provides a platform from which training can be offered.  There is a class registration system, content delivery mechanisms, personal profile/history per student, and certificate of completion and CEU capabilities.  Originally developed for one group within the Institute, it has been enhanced to add other groups as well as units outside of the Institute including:

  • Child Welfare Academy
  • School of Social Work
  • School of Social Work Continuing Education
  • SEEK Program
  • SEFEL
  • Maryland Department of Juvenile Justice
  • Psychiatry

National Technical Assistance and Reporting System: This system will provide state-of-the-art, evidenced-based methods for best practice interventions for children and families experiencing specific problems. The application will allow tracking and reporting  on categories of interventions.

Early Childhood Mental Health Outcomes Monitoring System: This system provides a means of measuring the success rates of different interventions for children with mental health problems.

Early Identification of Risk (EIR) for children attempts to determine how to identify socio-emotionally at-risk children at an earlier age (infants & toddlers) by screening both the parents and the child for adverse childhood experiences. This is a follow on to the Adverse Childhood Experiences (ACEs) study initiated by Harvard.  The School of Social Work, Institute for Innovation and Implementation is a study participant. CITS staff are developing a secure web-based portal in which to deposit and analyze data.

SEFEL: The Maryland Social Emotional Foundations for Early Learning provides resources to parents, families, trainers, coaches, teachers, and caregivers for evidence based training, story telling, and tools to prepare children for early learning opportunities.

Top

Voice Over IP: Implementation and Upgrades

Summary: The campus is replacing the legacy telephone service and the small key systems with the contemporary Cisco Call Manager.  This is a fundamental change in the underlying technology and will provide many new features on campus phones while saving money.

Targeted Time Period: This is an ongoing project involving all campus buildings and departments. Thus far, over 3,000 VoIP phones have been installed out of a targeted 6,500.  Another six hundred were installed by the end of FY '14.  Telecommunications has increased the targeted number of installations to be 1,000 for FY 15. The entire project will be completed in FY 2017.

A short term schedule for the immediate future is:

BuildingFloorSchool/Unit# of Phones
N3SON30
HSF11SOM28
MSTF5SOM42
HSF2GSOM36
HSF21SOM28
HSF22SOM56
HSF23SOM60
HSF24SSOM26
HSF24NSOM32
MSTF3SOM12

Primary Deliverables: This will replace 95% of the traditional analog and digital phones on campus with a secure, feature rich, integrated system.

Groups Participating in the Project: CITS' Data Communications office is working with all campus schools, departments, and some non-campus affiliates including off-site locations.

Benefits to Campus/Link with the Strategic Plan:

  • Provides costs savings to the physical plant for voice communications (i.e., copper)
  • Provides new features for end users (e.g., Campus Directory access from the phone and easy conferencing)
  • Enhanced location based 911/711 reporting
  • Provides a foundation for new collaboration technologies

Top

Campus Network Refresh

Summary:  The Campus Network Refresh project is a phased approach to replacing end-of-life network equipment with standardized equipment across the campus.  The plan is to first gradually replace equipment that is no longer supported by the vendor and then move towards standardizing on the same equipment at each location based on functionality.

Targeted Time Period: The project is currently in the Planning Phase with equipment purchase and installations scheduled to begin in calendar year 2015.

Primary Deliverables: Standard network equipment across the campus, which will increase critical equipment availability and reduce cost.

Groups Participating in the Project: The CITS Data Communications office is working with all campus schools, departments, and our Cisco sales support and engineering team.

Benefits to Campus/Link with the Strategic Plan:

  • Vendor supported hardware campus-wide
  • Only necessary to maintain a single supply of spare equipment that can be shared across campus
  • Critical equipment uptime increases
  • Better support resulting from network engineers having a thorough knowledge of all equipment
  • Cost savings by maintaining one spare inventory supply
  • An equipment refresh cycle for the campus that better enables predicting future campus network equipment costs

Top

Migration: Fac. Mgt. and EHS IT Environments to CITS

Summary: CITS and Administration and Finance entities will consolidate hardware infrastructure in order to reduce costs. To do so, they will:

  • Relocate hardware to 300 W. Lexington Street, an environmentally controlled facility for computer hardware.
  • Virtualize old hardware to minimize the risk of hardware failure on physical hardware.

Targeted Time Period: This project requires acquisition of substantial additional storage.  When the storage is purchased, installed, and configured a detailed project plan for migration will be developed.

Primary Deliverables: Reduced hardware and software costs and minimized risk for IT hardware

Groups Participating: Infrastructure, Network/Communications, A&F Applications

Benefits to Campus/Link to Strategic Plan:

  • Reduced costs
  • Increased collaboration
  • Consolidation of IT Resources
  • Improved IT environment

Top

CITS Communications

Summary: CITS is currently engaged in many high priority projects.  It is important to let the various campus constituencies know our progress in completing these projects and how the projects support the UMB Strategic Plan. CITS communications also helps prepare and distribute vital information to the campus about threats, new tools, or time critical issues.

Targeted Time Period: This is an ongoing process using various media to contact multiple audiences.  Updates to this page will be made weekly or bi-weekly depending upon the project.

Primary Deliverables: Faculty, students, and staff knowledgeable about and supportive of CITS' initiatives.  Information will be delivered via The Elm, eBoards, eBlasts, Campus IT Alerts, E-mail Distribution Lists, IT News, the Portal, branding, and digital signage

Groups Participating in CITS Communications: Enterprise Training Group, IT Help Desk, Windows Administration, the Web Development Team, Communications and Public Affairs, Dental School Office of Information Technology

Benefits to Campus/Link to Strategic Plan:

  • Users know what electronic tools and systems are available to apply to their operational problems and to assist in meeting strategic goals
  • Supporting collaboration and communications initiatives in the Strategic Plan

Top

Migration of Medical Alumni System Records to the Enterprise Advance System

The Medical Alumni Association has maintained fund raising records on a separate system from the campus enterprise system called "Advance".  Due to staff attrition and a desire to improve the reporting and tracking capabilities of fund raising activities with Medical School Alumni, it made sense for the records to be migrated into the Advance ssytem.  This eliminates a lot of data maintenance on the part of the MAA staff and provides improved and new functions for tracking and reporting gifts.

This is to be done in several stages.  Data is divided into categories and each data set is migrated into a test environment for verification.  Similarly, reports must be generated, tested, and verified. This project is scheduled to be completed in the fall of 2014. Final verification of data is will be complete by the end of September 2014.

Top

Exchange 2010

Summary: The primary objective of the Exchange 2010 project was to strategically position the CITS in-house managed Microsoft e-mail messaging services for the future.  All current functionality, including high availability and uptime requirements, are available as well as increased user mailbox storage limits.  This is the most cost effective solution to provide these services and meet legal and policy requirements.

Targeted Go-Live Time Period:

Migrated all of CITS by November 30, 2013. 

Migrated all schools and departments in the Campus domain by August 2014.

Primary Deliverables: New E-Mail system with larger mail boxes, enhanced web and ActiveSync access, and a platform that could lead to integration with cloud applications.

Groups Participating in the Project: All CITS offices have participated and have been migrated to the new environment.  All schools using the Campus domain will then migrate to Exchange 2010.  Then other entities will be engaged.

Benefits to the Campus/Link to the Strategic Plan:

  • Enhanced Online Web Access
  • Protection and Compliance enriched via a variety of anti-spam, antivirus, and compliance mechanisms to protect messaging integrity
  • Less expensive due to reduced costs for hardware/software, floor or rack space, HVAC, maintenance, and lower operational expenses

Top