Profile

CommunityPlatform_1350x900.jpg

Mark Jones

Edit My Profile


My Content

1 to 20 of 50+ total
Posted By Mark Jones 10-08-2024 08:20:30 AM
Found In Egroup: IT Accessibility Community
\ view thread
If you need more, I bet you can find lawsuits that cost institutions a lot of money in fines due to inaccessible web applications. If doing the right thing or the 'letter of the law' fail as motivation, appeal to budget and reputation concerns.
Posted By Mark Jones 09-23-2024 09:25:27 AM
Found In Egroup: Cybersecurity
\ view thread
Isn't that the 'tail wagging the dog'? It's required. Require it.
Posted By Mark Jones 09-17-2024 10:28:18 AM
Found In Egroup: AI
\ view thread
Just some news... "UTHealth Houston and OpenAI have announced a first-of-its-kind collaboration in the United States, marking the integration of AI technology into health care and education while protecting privacy." https://www.fiercehealthcare.com/ai-and-machine-learning/students-facul ...
Posted By Mark Jones 09-10-2024 08:45:29 AM
Found In Egroup: Google Workspace
\ view thread
We changed ours to 24 hours in response to an audit. This means users have to sign in once per day. No negative feedback to speak of.
Posted By Mark Jones 09-05-2024 11:08:08 AM
Found In Egroup: AI
\ view thread
Isn't AI just another source to cite? Is this just a matter of figuring out how the use of AI needs to be cited? How is it different than citing someone else's work that you then use to varying extent in your work? Cite the AI used, and the prompt used, and then you can decide if the AI got ...
Posted By Mark Jones 08-23-2024 11:02:26 AM
Found In Egroup: Identity and Access Management
\ view thread
Our guest registry is only concerned with establishing a vetted identity paired with a responsible sponsor. Authorization decisions are made by individual systems/services.
Posted By Mark Jones 08-23-2024 10:56:28 AM
Found In Egroup: Identity and Access Management
\ view thread
It's home-grown.
Posted By Mark Jones 08-23-2024 09:06:33 AM
Found In Egroup: Identity and Access Management
\ view thread
We have guest registration app and process that manages sponsorship of guests (for whatever reason). The app enforces our policies including account lifecycle.
Posted By Mark Jones 08-20-2024 12:40:43 PM
Found In Egroup: IT Accessibility Community
\ view thread
We are also interested. I know of tools that can be used during development, but what we are looking for is the ability to do independent reviews. Are there any automated options that do not depend on manual audits?
Posted By Mark Jones 08-15-2024 11:27:56 AM
Found In Egroup: Identity and Access Management
\ view thread
What qualifies as "identity specific data"? Does your HR system originate institutional email addresses?
Posted By Mark Jones 08-15-2024 07:31:45 AM
Found In Egroup: Identity and Access Management
\ view thread
When you give users multiple accounts, they pick one to use and ignore the others as much as they can. One person/one account. Don't add accounts, add attributes.
Posted By Mark Jones 08-14-2024 02:41:34 PM
Found In Egroup: Identity and Access Management
\ view thread
Name is a complicated topic. HR likely requires a person's 'legal name'. The Student system need a person's name as it will appear on their degree. I think you could argue that BOTH systems are authoritative for name. If the two systems are storing names and addresses for different reasons ...
Posted By Mark Jones 08-14-2024 02:10:41 PM
Found In Egroup: Identity and Access Management
\ view thread
In my opinion... Assuming one identity for one person... which you should. It is likely that you have at least two Systems of Record (SOAs): Human Resources and a Student system. These are clearly authoritative in determining who is an employee and who is a student (a person could be both). but ...
Posted By Mark Jones 06-13-2024 11:11:36 AM
Found In Egroup: IT Accessibility Community
\ view thread
Sean, The language I was pointed to had 'do not distribute' warnings all over it, but it essentially asks vendors to warrant that their product complies with a specific standard and obligates them to fix it for free if it proves otherwise.
Posted By Mark Jones 06-13-2024 09:48:54 AM
Found In Egroup: IT Accessibility Community
\ view thread
This is not my area, but I believe our contracts require a Voluntary Product Accessibility Template (VPAT) and a warranty regarding accessibility.
Posted By Mark Jones 05-23-2024 09:54:00 AM
Found In Egroup: IT Accessibility Community
\ view thread
For sure, the more champions and leverage you have the better. And politics are different at each institution, so what ever works at your campus... build where you have people with the passion. I have found that here the fact that the ADA is the law motivates executives, and pointing out that meeting ...
Posted By Mark Jones 05-23-2024 09:25:00 AM
Found In Egroup: IT Accessibility Community
\ view thread
I have a small team of programmers. We are part of our central Information Technology organization. Accessibility is considered from the inception of each project. Everyone on the team is expected to address accessibility as they are developing, just like they are expected to address security. ...
Posted By Mark Jones 05-23-2024 09:00:00 AM
Found In Egroup: IT Accessibility Community
\ view thread
I'm not really addressing your question, but I have a general comment. You mentioned that you work in disability services. I lead a development team. In my opinion it is a mistake to address accessibility as something that only benefits the disabled. It is my experience that meeting accessibility ...
Posted By Mark Jones 05-15-2024 10:04:00 AM
Found In Egroup: Privacy
\ view thread
What is the purpose of this debate? Shouldn't the goal be to satisfy both regulations? Is there a reason that this data wouldn't have both classifications? Are these regulations competing in some way?
Posted By Mark Jones 05-10-2024 10:29:00 AM
Found In Egroup: Cybersecurity
\ view thread
I believe that we treat video calls the same as in-person. We also make use of previously supplied personal email addresses and mobile numbers. If the user can prove control of a known personal email account or phone number or both it can be a reasonable way to increase confidence in identity ve ...