IT Project Management for the Self-Service Password Reset Project
Invitees (* indicates unable to attend):
Attendees:
- Joyce Landreth *
- Daniel Fisher
- Karen Herrington
- Dean Kirstein
- Brad Tilley *
- Ken McCrery *
- Rhonda Randel
- Kevin Rooney
- Marc DeBonis *
- Mary Dunker *
- Randy Marchany *
- Wayne Donald *
Agenda
Note: This project follows the IT low risk project form.
- Project Time Management
- If requirements are complete (i.e., we have defined the scope of the project), then we need a list of tasks to accomplish the requirements, called define activities.
- I assume the activity list will come from Ken, Daniel, and Kevin???
- Ideally activities are narrow enough in scope (detailed enough) to be able to give a reasonable duration estimate.
- Next we organize activities in an order based on dependencies, called sequence activities.
- Next we estimate the type and quantity of resources required, called estimate activity resources.
- For this project that is primarily human resources costs.
- Next we estimate how long it will take to do each activity, called estimate activity durations.
- Once the activity durations are in place a network diagram is established that shows project work flow, dependencies, and the critical path.
- This is optional but is nice from a project management perspective.
- Finally, we develop [the] schedule so those doing the work know when their work is supposed to be done.
- If requirements are complete (i.e., we have defined the scope of the project), then we need a list of tasks to accomplish the requirements, called define activities.
- Project Communications Management
- Review and complete the IT Project Communications Plan SSPWDReset-CommunicationsWorksheet.pdf
(blank form is here: https://secure.hosting.vt.edu/www.itplanning.org.vt.edu/pm/communicationsplan.html)
- Review and complete the IT Project Communications Plan SSPWDReset-CommunicationsWorksheet.pdf
- Project Risk Management
- Review and complete the IT Project Risk Management Plan SSPWDReset-RiskWorksheet.pdf
(blank form is here: https://secure.hosting.vt.edu/www.itplanning.org.vt.edu/pm/riskplan.html) - Review and complete the IT Project Security Plan SSPWDReset-SecurityForm.xls
(blank form is here: https://secure.hosting.vt.edu/www.itplanning.org.vt.edu/pm/securityplan.html)
- Review and complete the IT Project Risk Management Plan SSPWDReset-RiskWorksheet.pdf
- Project Quality Management
- Review and complete the IT Project Testing Plan SSPWDResetTestingWorksheet.pdf
(blank form is here: https://secure.hosting.vt.edu/www.itplanning.org.vt.edu/pm/testingplan.html) - If needed, review and complete the IT Project Training Plan SSPWDReset-TrainingWorksheet.pdf
(blank form is here: https://secure.hosting.vt.edu/www.itplanning.org.vt.edu/pm/trainingplan.html)
- Review and complete the IT Project Testing Plan SSPWDResetTestingWorksheet.pdf
- Project Human Resource Management
- Review and complete the IT Project Resources and Staffing Plan SSPWDReset-ResourcesStaffingWorksheet.pdf
(blank form is here: https://secure.hosting.vt.edu/www.itplanning.org.vt.edu/pm/resourcesstaffing.html)
- Review and complete the IT Project Resources and Staffing Plan SSPWDReset-ResourcesStaffingWorksheet.pdf
- Other
- Production ownership, support, and maintenance
2 Comments
Greg Kroll
May 07, 2009May 7, 2009 Meeting Notes:
Mary Dunker
May 08, 2009I will attempt to answer:
The origin of the project was in response to my understanding (from several years ago) that the Board of Visitors wanted to require people to periodically change their PID passwords -- once a year? The feeling at that time was that the calls to 4Help would be overwhelming if such a password change were mandated with no way to reset them online.
The Security Office wisely recommends incorporating monitors and limits for resets into the requirements in order to mitigate any potential security threats. Risks of an online process and risks of the current telephone process have been documented. If the Security Office is supportive of the project and the sponsors wish to continue it, further discussion of the value of the project seems counter productive. If, on the other hand, the Security Office believes further dicsussion of the value of continuing the project is needed, then lets' have those discussions now, before resources are expended to produce a requirements document for a project that may not go forward.
I recommend we get clarification from the Security Office, and if further discussion is needed, we use the May 14 meeting for that purpose. I will not be able to meet on May 21 meeting; Daniel may be absent as well.