Welcome to Indiana
Information Technology Associates LLC .

Serving Public and Private Colleges and Universities throughout the United States.

OverviewContact Us Button

Team Approach to Information Technology Assessment and Consulting

Executives, Professionals, and Specialists Working With You to Achieve the Right Outcome

Services

Indiana Information Technology Associates is all about teamwork! From a preliminary review, experienced executives, professionals and highly-skilled specialists are assembled by the lead consultant to meet your institutional requirements. Site visits are modeled after the familiar academic review process and follow a plan developed in conjunction with your college or university leaders. The consulting engagement often focuses on strategic planning, organizational effectiveness, infrastructure and systems with special attention given to how well information technology is meeting the needs and expectations of students, faculty, staff and administrators. An assessment of services, support, and business practices is offered. Security, policy and privacy experts may be included in teams as needed.

Strategic Planning

Plan, define goals and objectives, set priorities, allocate resources, implement the actions and assess results.

Organization Effectiveness

Determine the vision, values, structure, leadership, staffing, resources, and business practices to meet goals.

Infrastructure

Evaluate facilities, networks, and hardware, in conjunction with Systems, to ensure IT delivers the best solutions.

Systems

Review administrative, academic, and learning technology that support institutional processes and practices.

Services and Support

Ensure institutional needs are met by a proper suite of services, with robust support, at appropriate costs. Consider user satisfaction, support, training, knowledge bases, financial models, and activity-based budgeting.

Security, Policy and Privacy

Analyze, develop and implement plans and practices to minimize abuse of institutional resources and avoid breaches of data. Review policy development processes, data safeguards, incident responses, and user education.