Enterprise Architecture Principles
Enterprise architecture principles are a set of guidelines to be applied to increase the consistency and quality of technology decision making. They describe the big picture of the enterprise within the context of its technology intent and impact on the institution. Each principle will contain a definition, rationale and implications. The principles are aligned with the universities mission and goals.
Twelve Principles have been detailed by the Architecture Review Board as the basis for the enterprise architectural foundation for Loyola.
- Centralized Governance for Technology Acquisitions
Information Technology Services (ITS) will assess all new technology-related initiatives which acquire or provide data from authoritative sources to ensure their compliance with Enterprise Architecture (EA) principles. - University Strategy, Mission and Promise Alignment
Major change initiatives to applications and technology are driven by documented needs to enhance the University’s Strategy, Mission and Promise. - Data and Value Based Decision Making
The business value and total cost of ownership (TCO) for all technology components will be identified and agreed upon between the business stakeholder and Information Technology Services (ITS) prior to deployment or use. - Manage Technical Diversity And Duplication
Technological diversity is managed efficiently in order to minimize the additional effort and cost associated with maintaining disparate enterprise systems. - Built For Reuse
In an effort to reduce complexity Loyola will build common modular components and services that can be reused across systems. - Design For Flexibility and Self Service
Loyola will actively design, build and maintain solutions to create a flexible and sustainable environment. The ability for the client to utilize technology services by themselves will be provided where possible. - Enterprise Security
All technologies, solutions, tools, designs, applications, and methods used within the architecture must adhere to all security and privacy policies, procedures, guidelines, and standards. Uniform security practices decrease the likelihood of a security breach. - Data Security
Data is protected from unauthorized use and disclosure. This includes only providing access to data to those individuals who should have access to that data. This also includes properly classifying and protecting data according to Loyola data classification policies. - Manage Data as an Asset
Loyola values data as an asset because it can be leveraged across the University to enhance competitive advantage and accelerate decision making. University-wide access to relevant information is the rule, not the exception. - Data Quality and Integrity
By identifying authoritative sources, the activities related to data maintenance, data integrity and integration are more efficient, consistent, and cost-effective. - Data Accessibility
Stakeholders have access to the appropriate data necessary to perform their duties; therefore, data is shared across University functions and organizations. - Technology Services in the Cloud
Evaluating cloud based services for technology acquisitions will ensure a proper balance of service, security and costs.
Enterprise architecture principles are a set of guidelines to be applied to increase the consistency and quality of technology decision making. They describe the big picture of the enterprise within the context of its technology intent and impact on the institution. Each principle will contain a definition, rationale and implications. The principles are aligned with the universities mission and goals.
Twelve Principles have been detailed by the Architecture Review Board as the basis for the enterprise architectural foundation for Loyola.
- Centralized Governance for Technology Acquisitions
Information Technology Services (ITS) will assess all new technology-related initiatives which acquire or provide data from authoritative sources to ensure their compliance with Enterprise Architecture (EA) principles. - University Strategy, Mission and Promise Alignment
Major change initiatives to applications and technology are driven by documented needs to enhance the University’s Strategy, Mission and Promise. - Data and Value Based Decision Making
The business value and total cost of ownership (TCO) for all technology components will be identified and agreed upon between the business stakeholder and Information Technology Services (ITS) prior to deployment or use. - Manage Technical Diversity And Duplication
Technological diversity is managed efficiently in order to minimize the additional effort and cost associated with maintaining disparate enterprise systems. - Built For Reuse
In an effort to reduce complexity Loyola will build common modular components and services that can be reused across systems. - Design For Flexibility and Self Service
Loyola will actively design, build and maintain solutions to create a flexible and sustainable environment. The ability for the client to utilize technology services by themselves will be provided where possible. - Enterprise Security
All technologies, solutions, tools, designs, applications, and methods used within the architecture must adhere to all security and privacy policies, procedures, guidelines, and standards. Uniform security practices decrease the likelihood of a security breach. - Data Security
Data is protected from unauthorized use and disclosure. This includes only providing access to data to those individuals who should have access to that data. This also includes properly classifying and protecting data according to Loyola data classification policies. - Manage Data as an Asset
Loyola values data as an asset because it can be leveraged across the University to enhance competitive advantage and accelerate decision making. University-wide access to relevant information is the rule, not the exception. - Data Quality and Integrity
By identifying authoritative sources, the activities related to data maintenance, data integrity and integration are more efficient, consistent, and cost-effective. - Data Accessibility
Stakeholders have access to the appropriate data necessary to perform their duties; therefore, data is shared across University functions and organizations. - Technology Services in the Cloud
Evaluating cloud based services for technology acquisitions will ensure a proper balance of service, security and costs.