13.07.2015 Views

Departmental Self Review - UCLA Academic Senate

Departmental Self Review - UCLA Academic Senate

Departmental Self Review - UCLA Academic Senate

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2) Subject all new program and system deployments to a rigid costing model, looking at longtermIT staffing and support costs. Given current limits on IT staffing, all new programs thattake additional IT time or resources must include resources for long-term support, or becounterbalanced with equivalent cuts in other areas.3) Fund and narrowly focus school-supplied student support. Student support has relied forseveral years on Biomed Library IMF and Bruin Online staff. With the steady addition ofweb-based courses and programs, more and more specialized support is being shifted backin-house. This support must:a) Be funded at adequate levels.b) Be limited to specialized Nursing systems.c) Be time-restricted against over-use.4) Provide adequate staffing and resources to address growth in security requirements. Securityis a major responsibility academia has not really had to deal with before. With the rapid riseof identity theft, strong efforts are being made legislatively to hold organizations accountablefor ‘bad’ security. As a result, we can expect to spend up to a third of available IT staff timeand a significant fraction of the Nursing computing budget on security-related tasks andsystems.Organizational Benefits:The school’s primary missions all are increasingly dependent on information technology. Thelong-term successful positioning of the school will necessitate steady improvements inproductivity in every area. A careful, well-considered balancing of IT resources will:1) Insure sufficient support is available for research activities to flourish and expand.2) Maintain an optimal level of support for faculty, staff and students, and insure criticalsystems are available when needed.3) Secure school operations against the threat of financial loss and embarrassment due to criticaldata security breaches.4) Prevent the degradation of key systems and services due to staff overload.Resource Requirements:Improving research support levels will require the addition of staff, with salary needs offset byadditional grant funding support. The recommended staffing model will require at least start-upand possibly long-term partial support of additional position. A programmer/analyst I positionwill cost at a minimum $36,000/year, with other incidental expenses related to space, phones,etc. A portion of this expense would need to be absorbed by the school as detailed in theInformation Security Initiative below.Direct balancing of resources does not incur direct costs, Overall resources required aredependent on school goals and needs – specifically the IT staff time and capital resources neededto implement and maintain critical support and services. Only net increases in support orinfrastructure needs will require additional funding. Outsourcing options discussed in Initiative 9279

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!