Prioritization Proposal
Proposal Name / Security / Email Virus / SPAM appliance
Brief Description
(one or two sentences) / The BorderWare Email Security/SPAM Gateway is an email security, privacy and compliance solution that protects against email threats and controls outbound information to protect against malicious attacks and enforce compliance regulations.
Years on Priority List
(5 points)
What will be achieved?
(10 Points) / This appliance protects computers/servers/users on campus and off campus by blocking email viruses before they are delivered to the college email system. The spam feature checks emails for potential phishing schemes and unsolicited emails.
Justification: Why should this be done?
(20 points) / Our current email spam appliance is no longer capable of handling the 6000+ emails we receive everyday from Internet users. Each day more spam messages are getting past our filters and filling our email boxes. This appliance is designed to handle the larger volume of traffic giving us a better chance of deleting spam and protecting district systems/users from potential email attacks.
College Goals and/or Objective(s) & Student Learning.
(30 points) / Goal # 1 – Student Success - Email has become an important tool for student learning and communication. It is widely used by staff and faculty and it is now integral to student communication and learning. Any loss of email services due to virus or attacks would affect faculty/student communications for class assignments and student assistance. The added protection from email phishing schemes would secure faculty/staff/students from potential ID theft.
“Use technology to expand opportunities for student learning and student services and ensure a safe environment and improve security at all campuses” is another goal this proposal can be related to.
Does this proposal fulfill a mandate? / No
Does this proposal address a safety issue? / No
Will this proposal benefit other areas of the college? / Yes. Protection of email services affects all areas of the college
Will this proposal impact or require accommodations from other areas? / No
How will your proposal be achieved? Action plan summary: include primary steps, timeline for implementation, and who is responsible. / What
Purchase the Borderware email security gateway / When
As soon as funding is available / Who
IS staff
Assessment process: How will you determine that your proposal has been successful? / ·  Assess the number of spams before and after the implementation
·  Track the down time due to virus attacks after implementation and the reduction in the personnel time in monitoring and troubleshooting the attacks.
Resources Required: facilities, equipment, software, staff, etc. (include cost estimate) / Faculty: / Cost:
Classified:
Equipment: Appliance & software / $20,000
Facilities/other:
Costs after 1st year: Continuing salary plus increases / $4000/year
Comments of Dean or supervisor
Suggested Prioritization
(from division) / 7

Contact Person: __Bina Isaac Discipline/Area ____IS & Ed Tech _(Office of the President)____

President:

Documentation of Justifications:

Increases in demand for tutorial services may be measured by the following increases over the last four years:

§  Tutors hired increased from 30 to 114 per semester

§  DSPS tutee assignments increased from 10 to 50 per semester

§  ACES tutee assignments increased from 3 to 15 per semester

§  EOPS tutee assignments increased from 4 to 12

§  Locations where tutoring services offered increased from 5 to 11

§  Tutoring currently supports students in the following divisions: Communications, Math & Science, Applied Science & Business, Health Sciences and ECE, Social Science & Arts

Student contact hours for 2006-07

53,423 contact hours for group tutoring

8,219 contact hours for 1 on 1 tutoring

61,533 total contact hours

(Note: Group tutoring averages 6.5 students per tutor per hour. One on one tutoring is reserved for special programs that require service above what is generally available to COD students.)

Each of our 114 tutors was recruited, hired, trained, scheduled, and evaluated. (We get about ¼ turnover in tutors each year.) We must track work hours, process payroll, and maintain employment status records for all tutors. Tutor schedules change constantly throughout each semester because 1.) many are students who often need to change work hours to maintain their own course work 2.) tutee schedules change so our tutors must change as well. All of this has to be tracked and recorded.

Tutees must enroll in the appropriate sections of ASC 100 so we can best track our services to different disciplines. We enroll over 6,000 tutees each year.

The numbers and details described above are cited not to give a comprehensive assessment of the need, but to provide a sense of the scope of tutoring operations. There are many other clerical and academic tasks involved in running an effective Tutoring Center.