Technology-and-System-Plan-111913

advertisement
Technology and System Plan
Purpose: Youth for Change relies on the use of technology and electronic information to conduct
its everyday business. As such, it is essential that the organization have procedures that ensure
information technology is secured and regularly backed up. It is further necessary that potential
threats be minimized in a way that limits system access and interruption as much as possible. When
it comes to information gathering and reporting Youth for Change is at a critical point in its history.
It’s key that we develop a solid plan to deploy new technology and information to our staff. This
involves the development of new tools and techniques as well as the training to utilize them. This
document is designed to document our technology infrastructure and to facilitate our future goals.
Management Information Infrastructure: Youth for Change’s technology footprint is
distributed across 14 (? Not sure about his number) sites throughout Northern California.
Connectivity between our staff is maintained through a web centric electronic records system
called ALICE and Microsoft Exchange. All of the sites have computers and are connected to the
Internet. Three of the sites have servers. We are in the process of eliminating the server at the 7200
facility as we move the information contained in it to the ALICE server for greater availability.
Youth for Change will only be operating servers from Rio Lindo and the Administration building
when the migration is complete.
Microsoft Security Essentials Antivirus protects all of the machines used by our users. We have
adopted a policy that tries to mitigate the importance of individual computers by concentrating our
users resources in Microsoft Exchange and the ALICE system. Most client machines are
configured to reset themselves to a clean image of Windows that has been preconfigured to meet
the needs of our users after each reboot. The preconfigured computers come with Microsoft Office
and Google Chrome which are required to access documents used by Youth for Change and
ALICE.
Some client computers are setup to meet the needs of individual users. These machines are not
configured to reload themselves after each reboot. This is done where the user has need for specific
applications that cannot be easily reloaded. Examples include staff in our administrative office and
graphic design people. The administrative people require specialized accounting applications and
the graphics design people require tools like Adobe Creative Suite.
The administrative office has two Windows 2003 servers that host files and the company’s Black
Baud accounting software. The administrative office employs a Windows Active Directory to
connect all of the computers in the building. The Active Directory server also acts as a file server
for people at the administration site.
A Barracuda SPAM and virus firewall protects the Microsoft Exchange mail server located at Rio
Lindo. The Barracuda is used to scan incoming and outgoing email to protect from external threats
and possible internal issues. The Barracuda also provides virus-filtering software that runs on the
Exchange server to filter the mail store as it is accessed in real time. Youth for Change scans both
incoming and outgoing mail to prevent client computers from being infected with malware that
might send messages out resulting in Youth for Change being black listed.
The Youth for Change web server is operated at the Rio Lindo facility. It runs on an Ubuntu Linux
server. The web server is implemented using Word Press. The primary purpose of the web server
is to present information to the public but it also gathers some information that is manually
processed by Youth for Change staff and integrated in the ALICE server.
There is application called Orca used to register members of the public for trainings conducted by
Strategies. The Orca server operates on the same machine with the Youth for Change web site.
The Youth for Change web site and Orca application both run on the same server but they are
isolated from each other. Orca was developed using a modified version of Word Press and a
licensed plug-in called Event Espresso. The Orca server also provides a staff activity-tracking
application for Strategies team members.
Youth for Change is highly distributed company that is dependent on the web and reliable Internet
service to facilitate communication between our sites and staff. We have developed a document
management system known as ALICE to unify all of our facilities. ALICE provides a centralized
location to deploy the different services required by our staff in highly customizable way. This
couples with our web based email services to ensure that our staff can access all the information
they need to do their job from anyplace they are.
ALICE is design to be secure. It will only allow users to connect to the server through a secure
https connection. All user interaction with the server is logged to ensure we can audit it later. The
data in the ALICE server is compartmentalized. The most important and sensitive information in
ALICE is our client database. The database tracks everything from billing to assessment data
related to our clients. ALICE enforces a strict policy that says users have access to nothing in the
database unless specifically granted permission to that information. The ability to grant access to
information is limited to staff in our administrative and medical records departments. When users
leave the company our human resources department disables their account resulting in their
immediate loss of access to all information in ALICE.
Prior to ALICE we were dependent on Microsoft remote desktop protocol to access computers
located a different facilities. This presented issues in certain environments with highly restrictive
firewalls or for users with limited devices like smart phones. In the remote desktop era users
maintained client information using Microsoft Excel and Word documents. The exchange of these
documents sometimes proved difficult between facilities and there was redundant information
maintained by different users.
ALICE is being deployed to provide one centralize location for information. The goal is to ensure
that information Youth for Change has can be access by the appropriate staff wherever it is needed.
To this end we refocusing our users and training them to access company resources through the
web and services like remote desktop are becoming less relevant and being slowly phased out.
ALICE has many documents built into it like billing logs, client plans, client-assessments and
client outcomes gathering tools. The documents built into ALICE enforce proper entry of
information through a process called validation. The goal is to use ALICE to improve not only the
accessibility of client information to authorized staff but also the integrity of the data gathered.
The process of creating validated documents allows Youth for Change the ability to codify its
business processes and logic using software in a way that not only enforces proper data entry but
also records and clarifies the business processes.
ALICE has been developed to establish a workflow model. The idea is to coordinate our staff and
client database in a way that that creates a feedback loop. When staff log into ALICE they are
presented information gathered from various parts of Youth for Change on their Dashboard. The
Dashboard is the first screen that staff members see upon logging into ALICE. Some of the
information contains current statistics about how the staff member and company as a whole are
performing. Other information prompts the user to take action. For example, if a client assigned to
a staff member is missing a document they staff member may be prompted to collect it. Once the
document has been entered into ALICE the prompt will disappear. If a staff member collects a
document late their manager may be notified.
The IS department uses a ticketing system built into ALICE to track staff issues and other
technology projects. Users can create new tickets through ALICE. When a ticket is created IS
staff are notified. There is a ticket coordinator that reviews the ticket and assigns it to the best
member of the team to handle the issue. The tickets can track information such as the inventory
items that are involved in the situation, the staff that made the request, the staff the ticket is
assigned to and comments related to handling the ticket. It is possible for managers to run reports
on the ticket database to isolate things like the history of troubles related to a specific machine or
staff member.
Inventory is managed through ALICE. The inventory database is designed to complement the
ALICE ticketing system. A reviewer can view any inventory item and see all help tickets that have
ever been associated with it and by proxy all of the staff or other resources expended on it. The
inventory database tracks many attributes about each item like serial numbers, photographs and
locations of the item. The location information allows Youth for Change to associate inventory
items with specific places on 2D maps of Youth for Changes sites. This makes it possible for a
reviewer to display a 2D map of any of our sites and see the exact physical location of all the
devices there. The user can then click on the device and view all the details about it as well as
pictures of it. ALICE makes it easy to track inventory and review when the last time a resource
was seen.
The ALICE medical records server is run from the Rio Lindo facility on a dedicated server.
Wi-Fi is an important part of our distributed agency’ss infrastructure. All Youth for Change
facilities provide Wi-Fi access to the Internet. A WPA2 key is used to limit public access to the
Internet but we have determined that the Wi-Fi interfaces are not adequately protected.
Plans are being developed to update Wi-Fi access points and create two networks at all sites. One
highly secured network with full access to the facility but restricted to specific users and another
more open network with limited Internet only capabilities. The highly restricted network would
control access through an authentication system tied to ALICE accounts and each user would have
a different password. The less restricted network would use a common password for all people
accessing the network and greatly restrict user bandwidth and access to resources.
Backup Policy: There are servers located at three sites. All of the servers are virtualized with
VMWare ESXi and backups are conducted of each virtual machine on an incremental basis. The
backups are made to hard drives attached to each of the servers through a SATA port. The backup
drives themselves are swapped once a week and the swapped drive is taken off site to protect
against issues that may happen to the facility. The off-site backups are tested periodically by
loading the virtual machines on a test machine to ensure they are working correctly. We use a
records management system called ALICE for collecting our information and making it available
to the staff. Alice has a web-based tool called as File Cabinet and most of our staff uploads their
files to that. ALICE runs on one of the virtualized servers that is archived every night and this
ensures that our staff information is protected against loss or damage when they roam between our
sites. While most of our information is archived through ALICE or maintained directly on one of
our servers some users are tasked with backing up their own data due the extreme size of their
information and limitations with transporting it through the Internet. These user backups are all
conducted with an open source tool called FreeFileSync. FreeFileSync accurately ensures that data
on the user’s computer is in alignment with data on an external backup drive.
Computer Operating Systems: Youth for Change uses a variety of operating systems to meet the
needs of our users. Most of the client computers are currently running Windows 7 but there are
still a few machines running Windows XP. We have been replacing the Windows XP machines as
users discover issues with them and the goal is to eliminate them by 2014. Our mail server runs
Microsoft Windows 2008 server. Our administrative building utilized two Windows 2003 servers
as a file-server and host for the companies Black Baud accounting software. Our web servers and
ALICE run on Ubuntu Linux. All of our servers operate as virtual machines hosted on VMWare
ESXi servers.
General Applications: Youth for Change uses Microsoft Office for its general businesses
applications, including word processing, spreadsheets, presentations, and databases. The IS
department provide periodic trainings to help staff utilize these tools. We track the training each
of our staff has received.
Specialized Applications: Youth for Change administrative staff utilize Black Baud accounting
software to do payroll and book keeping. Some members of our staff use Adobe Creative Suite to
create presentations and graphics. We also utilize an internal medical records system called ALICE
described in depth throughout this document.
Connectivity and Communication: All management and clinical staff have access to computers
and the Internet. This includes access to web enabled computer email system and ALICE document
management server. Users can also access their email directly from a smart phone or Microsoft
Outlook. The technology resources provided are to be used for agency business only. In addition,
Youth for Change promotes effective and efficient communication via telephone, hard line and
cell. These phones are to be used for agency business only.
Policies on Usages of Agency Equipment and IT resources: Youth for Change equipment,
including computer hardware and software are valuable assets. They must be used for Youth for
Change business only. Staff may not copy or use The Youth for Change purchased/leased software
contrary to the interests of the organization or for purposes other than the business reason for the
purchase or lease. Employees may not use e-mail for personal, nonbusiness-related use.
Youth for Change may access any staff computer, e-mail information files, or voice mail to better
serve the needs of the agency or to make certain that they are being used properly and in
compliance with this policy. Email, voice mail, as all computer data, are considered company files
and not the property of any individual.
Youth for Change employs a proprietary document management system called ALICE. The
ALICE software records detailed logs of all user interactions. Management can use these logs to
audit all user activity and access to company information.
* No agency property, including computers, may be used for unlawful purposes; or to offend,
harass, abuse, or otherwise communicate offensive, unlawful, or inappropriate messages or
messages in violation of the Youth for Change policy prohibiting harassment, including sexual
harassment. Nor may they be used to access material unrelated to the performance of the business
of the agency. Employees should be aware that emails and voice mail messages could be retrieved
and even subpoenaed for litigation and compliance investigations. Stored information including
email and voice mail messages may not be deleted or destroyed if the subject of or relevant to a
claim of litigation.
* Violation of this policy will subject the employee to discipline.
Security, Privacy and Confidentially: Computer and email security: All staff with access to
client, financial or any other agency related information are expected to treat the information with
the highest level of confidentiality. Employees with electronic access to the information are
assigned passwords and are expected to treat them with extreme care. If any password is lost or is
suspected of being compromised, the user is required to inform their supervisors immediately.
Many of our records are available through the ALICE document management system. Users are
expected to access the system in an environment that will not compromise sensitive information.
Users are not to export or attempt to access information they are not specifically authorized to see.
If a user suspects they have access to information that should be restricted they are expected to
report it to their supervisor immediately for correction.
The ALICE server has been configured to not allow connections from computers located outside
of California. This is designed as an added security measure. Youth for Change assumes that only
people located in California should have access to our resources and this helps to limit potential
trespassers.
Staff Training: Employees that are required to utilize specialized company applications like
billing systems, company email or the ALICE document management system are trained upon hire
and are periodically retrained on them as the necessity arises. The agency allows users to view and
register for available internal trainings at any time in ALICE. The agency also tracks all employ
training and certifications through the ALICE staff management interface. We periodically pull
reports to isolate employees that require training or training updates.
Assistive Technology: Youth for Change is committed to providing appropriate assistive
technology to those in need of such. An “assistive technology device” refers to any item, piece of
equipment, or product system, whether acquired commercially off the shelf, modified, or
customized, that is used to increase, maintain, or improve functional capabilities of individuals
with disabilities. The need for assistive technology must be determined on a case-by-case basis. If
a need is identified that a particular assistive technology item is required and will deliver a
reasonable benefit, the technology will be provided to implement into the programs.
Technology and System Plan Goals
1. Goal: Centralize and standardize file storage around ALICE File Cabinet.
Strategy/Objective: Currently we store company electronic documents using different
strategies at each of our locations. A great deal of the information we store is left to individual
staff to manage. This can create gaps in the availability of our company documents and
situations were data could be lost due to poor backup management. Several of our sites have
small file servers that contain information that should be centralized to make management and
backup easier. The 7200 server is an example of such a server.
The goal is to migrate the documents in the Exchange public folders and on these small file
servers the ALICE File Cabinet.
Responsible Person: IS Director, Administrative Analyst/Webmaster, IT Support
Target Date: 6/1/2014
Update: waiting for new ALICE update on 10/10/13.
2. Goal: Continue Development of ALICE Electronic Medical records.
Strategy/Objective: Migrate more existing paper client forms into Alice. Begin deployment
of electronic signatures and tools to help reduce the use of paper and making company
information highly available to authorized staff. Migrating more information into ALICE will
allow for more accurate gathering of client data the ALICE workflow to be made more
accurate.
Responsibility: IS Team, Medical Records Office Manager
ongoing.
Update: waiting for new ALICE update on 10/10/13,
Target Date: 1/1/2015 and
3. Goal: Integrate electronic prescription management into ALICE.
Strategy/Objective: Work with MD Toolbox to integrate prescription management into the
ALICE client database. The result will be electronic deployment of prescriptions and
prescription renewals.
Responsibility: IS Director, Medical Support Program Manager
Update: waiting meeting with MD Toolbox technical support staff.
4. Goal: Deploy Comcast business class Internet to all sites.
Strategy/Objective: Improve reliability and speed of Internet services at all of our sites. This
is critical making the web-based architecture we are moving toward work for Youth for
Change. The reliable use of ALICE is highly dependent on this.
Responsible Person: IS Director, Chief Operations Officer
Target Date: 1/1/2014
Update: several sites have been updated. We’re working with Comcast to complete the rest
of the rollout.
5. Goal: Establish new server room at Rio Lindo facility.
Strategy/Objective: This critical to the deployment of ALICE. The new server room
includes and updated battery backup and power management system and improved interfaces
to swap backup drives. Updates will be made to the VMWare host server to allow for realtime backups of running servers. Currently servers need to be brought offline to do nightly
backups. This makes them unavailable for up to two hours. After VMWare is updated the
serves will only have to go offline for hardware maintenance, which rarely happens
Responsible Person: IS Director
Target Date: 11/1//13
Update: server room is in the process of being cleaned up. New server is prepared and ready
for deployment.
6. Goal: configure most user computers to reset to clean OS image after each reboot.
Strategy/Objective: most of our users do not need to store information on their computers.
These users will be migrated to machines that reset after each reboot. This will help to ensure
that people don’t leave information on machines that can be lost. It will force users to use
ALICE to backup all their documents. It also prevents the spread of viruses and other
malware helping to improve our network security and the reliability of the users computers.
Responsible Person: IS Director, IT Support
Target Date: 6/1/2014
7. Goal: improve Wi-Fi access and security.
Strategy/Objective: Wi-Fi networks need to be configured to limit access of outside parties
to our networks. The new system will only allow unrestricted access to users that have been
authorized using their valid Alice login. All other parties will have access to less secure
restricted Wi-Fi zone. This will achieved by deploying a modified version of OpenWRT to
each of our sites.
Responsible Person: IS Director
Target Date: 6/1/2014
Download