SlideShare a Scribd company logo
1 of 11
Assigning
access to
academic
information
Layered access to research output data
Selecting who can access CV
data
The review process for research
institutions often consists of
academic CVs being manually
submitted to reviewers. UNIWeb
allows for researchers to submit
their CVs, but also for reviewers
to collect or view them. In order
for institutions to ensure that the
right people have access to the
right data, UNIWeb’s access
control gives administrators the
control and flexibility to
determine which members in the
network would have access to
which information.
Account delegation
Administrative work is often
delegated in the world of research.
Taking this into consideration,
UNIWeb’s account delegation
allows any UNIWeb user to grant
access to their account to any
other UNIWeb user. This means
that you can assign
administrators, assistants or any
willing person to access your
account, allowing them to handle
tasks for you, such as update your
CCV or produce personal reports.
1.
Assigning the right
access to the right
people
Creating permissions and access
for administrators
Setting up account permissions ensures that every
user has access to exactly what they need.
◎ UNIWeb creates specific roles, with specific
permissions, for each member in the research
lifecycle.
◎ These permissions include the ability to create
new members, delete members, access
metrics, edit profiles, and more.
◎ Roles are also associated with a specific unit,
or department.
Creating and assigning
permissions to roles
List of permissions granted to
an administrator
Title of administration role
Create or edit administration
roles
Assign members to
administration roles
2.
A secure way to
delegate work
Delegating account access and
saving time
A safe and secure way for researchers to
delegate their administrative work
◎ Delegating access your UNIWeb account is
easy: all it takes is the name of person you
want to have access to your account. Send
them an invite, and when they accept, they can
immediately have access.
◎ No sharing of passwords is required, and there
is no risk of unlimited access to all your data.
◎ When you’re done, you can just as easily
revoke the access.
Account delegation feature
Invite members in your
network to be delegates
Request to be a delegate to
someone’s account
Access the accounts of
members who have granted
you access
Manage your delegates
Privacy &
productivity
Researchers have total
control over who enters
their CV information,
how it is displayed and
who can view it.
Input for
delegates
Output for
reviewers
Thank you!
Any questions?
Phillip Desjardins
1-613-627-3029
@Proximify
phil@proximify.ca

More Related Content

Similar to UNIWeb: assigning access to academic information

Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User ManagementNetIQ
 
Final PffrftfftftfffPTprocareer_ppt.pptx
Final PffrftfftftfffPTprocareer_ppt.pptxFinal PffrftfftftfffPTprocareer_ppt.pptx
Final PffrftfftftfffPTprocareer_ppt.pptxpatadiyakevin3
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptxRoshni814224
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfKamal Acharya
 
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES IJNSA Journal
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
AD-Bridge.pdf
AD-Bridge.pdfAD-Bridge.pdf
AD-Bridge.pdfneoalt
 
Federated Access Management 102
Federated Access Management 102Federated Access Management 102
Federated Access Management 102JISC.AM
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityNexlar Security
 
Security and Authorization
Security and AuthorizationSecurity and Authorization
Security and AuthorizationMegha yadav
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access ManagementBeyondTrust
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns WSO2
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16kevin_donovan
 
Access control policy
Access control policyAccess control policy
Access control policyBsmah Fahad
 

Similar to UNIWeb: assigning access to academic information (20)

Challenges of Active Directory User Management
Challenges of Active Directory User ManagementChallenges of Active Directory User Management
Challenges of Active Directory User Management
 
Final PffrftfftftfffPTprocareer_ppt.pptx
Final PffrftfftftfffPTprocareer_ppt.pptxFinal PffrftfftftfffPTprocareer_ppt.pptx
Final PffrftfftftfffPTprocareer_ppt.pptx
 
Database Management System Security.pptx
Database Management System  Security.pptxDatabase Management System  Security.pptx
Database Management System Security.pptx
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
INFORMATION SECURITY SYNTHESIS IN ONLINE UNIVERSITIES
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
AD-Bridge.pdf
AD-Bridge.pdfAD-Bridge.pdf
AD-Bridge.pdf
 
Resume
ResumeResume
Resume
 
Identity Managment
Identity ManagmentIdentity Managment
Identity Managment
 
Federated Access Management 102
Federated Access Management 102Federated Access Management 102
Federated Access Management 102
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Importance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization SecurityImportance of Access Control System for Your Organization Security
Importance of Access Control System for Your Organization Security
 
Security and Authorization
Security and AuthorizationSecurity and Authorization
Security and Authorization
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
Overview.ppt
Overview.pptOverview.ppt
Overview.ppt
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
Iam update 2014.10.16
Iam update   2014.10.16Iam update   2014.10.16
Iam update 2014.10.16
 
Access control policy
Access control policyAccess control policy
Access control policy
 

More from Proximify Public Relations

More from Proximify Public Relations (9)

UNIWeb group profiles and shared equipment
UNIWeb group profiles and shared equipment UNIWeb group profiles and shared equipment
UNIWeb group profiles and shared equipment
 
GLOT
GLOTGLOT
GLOT
 
GLOT: Expert Networks Plugin
GLOT: Expert Networks PluginGLOT: Expert Networks Plugin
GLOT: Expert Networks Plugin
 
UNIWeb tracking and measuring research outputs
UNIWeb tracking and measuring research outputsUNIWeb tracking and measuring research outputs
UNIWeb tracking and measuring research outputs
 
UNIWeb reusing academic cv data
UNIWeb reusing academic cv data UNIWeb reusing academic cv data
UNIWeb reusing academic cv data
 
UNIWeb putting science on the map
UNIWeb putting science on the mapUNIWeb putting science on the map
UNIWeb putting science on the map
 
UNIWeb managing accounts across institutions
UNIWeb managing accounts across institutionsUNIWeb managing accounts across institutions
UNIWeb managing accounts across institutions
 
UNIWeb creating clusters of expertise
UNIWeb  creating clusters of expertiseUNIWeb  creating clusters of expertise
UNIWeb creating clusters of expertise
 
UNIWeb: blazing fast academic cv data management
UNIWeb: blazing fast academic cv data managementUNIWeb: blazing fast academic cv data management
UNIWeb: blazing fast academic cv data management
 

Recently uploaded

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...software pro Development
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 

Recently uploaded (20)

HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 

UNIWeb: assigning access to academic information

  • 2. Layered access to research output data Selecting who can access CV data The review process for research institutions often consists of academic CVs being manually submitted to reviewers. UNIWeb allows for researchers to submit their CVs, but also for reviewers to collect or view them. In order for institutions to ensure that the right people have access to the right data, UNIWeb’s access control gives administrators the control and flexibility to determine which members in the network would have access to which information. Account delegation Administrative work is often delegated in the world of research. Taking this into consideration, UNIWeb’s account delegation allows any UNIWeb user to grant access to their account to any other UNIWeb user. This means that you can assign administrators, assistants or any willing person to access your account, allowing them to handle tasks for you, such as update your CCV or produce personal reports.
  • 3. 1. Assigning the right access to the right people Creating permissions and access for administrators
  • 4. Setting up account permissions ensures that every user has access to exactly what they need. ◎ UNIWeb creates specific roles, with specific permissions, for each member in the research lifecycle. ◎ These permissions include the ability to create new members, delete members, access metrics, edit profiles, and more. ◎ Roles are also associated with a specific unit, or department.
  • 5. Creating and assigning permissions to roles List of permissions granted to an administrator Title of administration role Create or edit administration roles Assign members to administration roles
  • 6. 2. A secure way to delegate work Delegating account access and saving time
  • 7. A safe and secure way for researchers to delegate their administrative work ◎ Delegating access your UNIWeb account is easy: all it takes is the name of person you want to have access to your account. Send them an invite, and when they accept, they can immediately have access. ◎ No sharing of passwords is required, and there is no risk of unlimited access to all your data. ◎ When you’re done, you can just as easily revoke the access.
  • 8. Account delegation feature Invite members in your network to be delegates Request to be a delegate to someone’s account Access the accounts of members who have granted you access Manage your delegates
  • 9. Privacy & productivity Researchers have total control over who enters their CV information, how it is displayed and who can view it.
  • 11. Thank you! Any questions? Phillip Desjardins 1-613-627-3029 @Proximify phil@proximify.ca