Administrator or Administrative Access: An individual or group of individuals with server or database administration rights on a given system or systems.
Application: A browser-based or other proprietary application used to allow one or more end-users to read, access, modify, input or retrieve data, from a server-based system.
Application Administrator: An individual with privileges to manage, maintain, modify or update an application hosted on a system or server.
Database Administrator: An individual responsible for understanding the platform on which the database runs, planning and coordinating security measures with network administrators, administering database management system software (including, but not limited to, managing user accounts), testing and coordinating modifications to the system, troubleshooting problems and ensuring the proper overall performance of the system.
Data Custodian: The IT support person(s) responsible for maintaining systems/servers and protecting specific sets of data.
Data Steward: The individual responsible for the creation or management of the data itself and who has overall responsibility for authorizing access and use of the data and who has significant responsibility for data protection. This role is usually assigned to a non-IT person.
End-User: An individual accessing or utilizing an application or system as a user only, not as an administrator or privileged user of the system.
FERPA: The Family Educational Rights & Privacy Act
GLBA: The Graham Leach Bliley Act
HIPAA: The Health Insurance Portability and Accountability Act
Inbound Internet Access: A server or workstation that is generally accessible by any Internet user or site.
Named Administrator Account: A named account is an IT specific account that provides privileged access to systems and other IT resources that in some way represents the name of the individual using the account.
Mobile Device: A computing device such as a smart phone or tablet that is designed for portability.
Portable Storage Device: Any device such as a USB drive that allows data storage and is easily portable.
Privileged User: A user of a system who has higher system access privileges than an end-user but who is not an administrator of the system, the database or of the application. Typically these users are those who update content, correct database errors, transmit data to and from systems, or run reports.
Principle of Least Privilege: The process of establishing differentiated levels of system access that allow end-users or privileged users access to only the system resources they need to perform their jobs or tasks, no more and no less.
Qualified IT Professional: An individual, qualified by virtue of training and/or experience, working for the University, by employment or contract, in an information technology-related title appropriate for the work being performed.
Remote Access: Access to an information system residing on the University's network when away from the university's network.
Remote Administration: System, database or application administration activities when the "administrator" is away from the affected system, whether on the University's network or not.
Strong Encryption: A level of encryption that is dependent, to some extent, on encryption standards that exist at any given time. Consult the ISO at each business unit for current strong encryption standards.
System Administrator: An IT support person or persons responsible for one ore more systems which may hold and process data owned by one or more data stewards.
System/Server: A hardware or virtual computing environment that is installed or configured to provide, share, store, or process information for multiple users or, that communicates with other systems to transmit data or process transactions.
Follow Business Intelligence