NASCIO Resources

Commonwealth of Virginia’s EIA Strategy and NIEM Integration Plan (webinar)

  • July 2013
  • Number of views: 10683

Commonwealth of Virginia’s EIA Strategy and NIEM Integration Plan

The Commonwealth of Virginia has completed an eight-month strategic planning process to develop an Enterprise Information Architecture (EIA) strategy.  A central element of the EIA strategy involves building exchanges for “citizen-centric” data that conform with the National Information Exchange Model (NIEM).

Virginia’s NIEM integration plan will enable the state government to comply with new statutory requirements for standardizing Person data and promote enhanced capabilities for business-driven information exchanges.

This webinar will provide insight on Virginia’s emerging EIA strategy and NIEM integration planning. The primary focus will be on Virginia’s EIA strategic plan and successful implementation of the NIEM Engagement Process.

Effective Cross-Jurisdictional Collaboration – Governance is Critical!

  • July 2013
  • Number of views: 9557
Effective Cross-Jurisdictional Collaboration – Governance is Critical!

Cross-jurisdictional collaboratives are on the rise. As the number of such collaboratives increases, there are essential ingredients for framing and sustaining successful and even exceptional collaborative arrangements that deliver real outcomes. As NASCIO reviewed successful collaboratives, proper governance continually surfaced as one of those essential ingredients for effective sharing of government information and services and effective employment of technology across two or more enterprises. This issue brief presents examples of effective governance and describes what constitutes effective governance.

The Health IT Landscape: Through the Lens of the State CIO

  • June 2013
  • Number of views: 6274
The Health IT Landscape: Through the Lens of the State CIO

The Healthcare Information and Management Systems Society (HIMSS) and National Association of State Chief Information Officers (NASCIO) formed a collaboration to determine how the State Chief Information Officer (CIO) views the current health information technology landscape. Specific areas of focus for this study included Medicaid Management Information Systems (MMIS), Medicaid Eligibility Systems, Data Governance and Identity Management, State Level Health Information Exchanges, Shared Services and Collaborations. This study combined HIMSS' expertise in health information technology and information exchange with NASCIO's expertise representing state CIOs and information technology executives from the states, territories and the District of Columbia. The results of this collaborative survey will serve those seeking to understand the current environment of State healthcare technology initiatives ranging from governance models to data exchange activities. This analysis will also facilitate understanding of the intersection of the state CIO's role with state health information technology (HIT) projects. This collaboration represents one of the first holistic analyses focused on the state CIO perspective of State HIT projects.

Examining State Social Media Policies: Closing the Gaps

  • June 2013
  • Number of views: 5821
Examining State Social Media Policies: Closing the Gaps

The issue brief focuses on state use of social media, specifically on state social media participation policies ("SMPP's"). NASCIO's Legal Advisory Working Group took a look at 31 SMPPs, which focus specifically on guidance/policy given to state employees regarding their participation in social media.

States have come a long way in the past few years, with the majority implementing social media policies or working towards one. However, some of the gaps found have the potential to open up states to some severe heartburn: including employee discontent, management concerns, public perception and liability.

The issue brief also addresses the inclusion of clauses on confidentiality, ethical conduct, security and privacy, and transparency in SMPP's.

The Changing Roles of the Chief Architect and the CIO (webinar)

  • April 2013
  • Number of views: 3712

Three important findings have combined to motivate this topic:

  • #1 Poor data management performance to date (requires additional or difference effort)
  • #2 Recognition that data is not a project (requires a difference approach)
  • #3 Lack of domain expertise (requires different career preparation)

Combined these three findings require a new look at these roles.  This webinar will explore the role of a Chief Data Officer (CDO) as a function needed by organizations (especially state governments).  While we don't yet have all the answers, we can at least lay out three necessary but insufficient prerequisites to making progress faster than we have achieved to date.

Capitals in the Clouds Part V: Advice from the Trenches on Managing the Risk of Free File Sharing Cloud Services

  • April 2013
  • Number of views: 4760
Capitals in the Clouds Part V: Advice from the Trenches on Managing the Risk of Free File Sharing Cloud Services

Cloud-based file sharing solutions have become very popular and certainly a growing and significant part of day-to-day computing. It is easy to see why these services are attractive to state government users after using them in many facets of their personal life. With a wide variety of choices in the market, these solutions are easy to access, configure and use. They support multiple devices (especially mobile), and data in multiple formats. The most important consideration for state employee users – these file sharing services are free. Since the release of the 2012 NASCIO and Deloitte Cybersecurity Study, more security and policy questions have been raised on the use of free cloud services by states. In addition to the May 2012 Capitals in the Clouds IV guidance on rogue cloud users, states have continued to seek out leading practices on how to put the proper controls in place, meet security standards, craft acceptable use policies, and identify the open records and legal concerns regarding terms of service. This brief helps to provide real experience from Commonwealth of Pennsylvania on free cloud services.

Driving Efficiency and Innovation by Consistently Managing Complexity and Change (webinar)

  • February 2013
  • Number of views: 3667

This presentation outlines the four pillars of a Holistic Enterprise Architecture: architectural models, framework, methodology, and implementation/solution models. It also explains the business and technology gains, and demystifies the practice of implementing a successful Holistic Enterprise Architecture.

Limitations on Liability Infographic

  • January 2013
  • Number of views: 5279
Limitations on Liability Infographic

NASCIO's 2004 publication NASCIO on Unlimited Liability - Gaining Traction on the Road to "Win-Win" recommended changes to the state IT procurement policy regarding limitations on liability, and research from 2010 and 2012 show subtle changes have occurred in the states. This infographic indicates which states have limitations on liability in statute, which states have none, and which states are able to negotiate limitations on a case by case basis, and compares the current situation to previous NASCIO research.

Hawaii Integrated Information Sharing and the Open Justice Broker Consortium (webinar)

  • November 2012
  • Number of views: 2747
Join us to learn how the state of Hawaii has partnered with state and local government to share justice information using NIEM, and the Global Reference Architecture (GRA).

NASCIO Call-to-Action: The Necessity for Maturing Identity and Access Management in State Government

  • November 2012
  • Number of views: 4375
NASCIO Call-to-Action: The Necessity for Maturing Identity and Access Management in State Government
As state leaders act to streamline services, consolidate IT infrastructure and perform more efficiently, trusted digital identities and their authentication becomes a critical enabler with the digital ecosystem. All levels of government and the private sector, are confronted by this challenge and are working together to create common policy, guidelines, standards, and responsibilities to protect cyber assets and ensure appropriate mechanisms are in place for a coordinated identity ecosystem. This guidance presents the value proposition along with key factors for establishing an enterprise-wide approach to identity management.
RSS
First45678910111213Last

Resources By Category

Categories

Resources By Date

Archive