Business intelligence's success bodes well for identity intelligence, since it is based on the same principles. Business intelligence collects data from isolated application "silos" into a central repository, where analytic applications process it to reveal patterns and trends. Identity governance likewise centralizes user access information from critical applications, allowing managers to analyze it to identify risky employee populations, policy violations and inappropriate access.
Indiana University has been generous in sharing its written policies with the Knowledge Network. You also can take a look at these: