EDUCAUSE DC Policy Office Update

Slides:



Advertisements
Similar presentations
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Advertisements

1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Privacy and Security Risks in Higher Education
E – Commerce and the Applicable Law Rules Judge Ehab Maher Elsonbaty Judge of South Sinai Court in Egypt and Visiting Scholar in the Institution for computer.
How Recent Government Initiatives Will Impact IT on Your Campus, October 10, 2000 Preconference Seminar 13P - How Recent Government Initiatives Will Impact.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Ten Years of ICPL From the Cornell Perspective 1.
Number 10: To Respond or Not to DMCA Notices Pro –Good faith effort towards content owner concerns. –As a matter of policy and citizenship obligations.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
Federal Communications Commission (FCC). The FCC is a United States government agency and was established by the Communications Act of The FCC is.
IAPP KnowledgeNet Los Angeles “Thinking Outside the Cookie Jar” The Second Wave of Global Privacy Protection: Why This Year Is Different Peter Swire, Senior.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Communications Assistance for Law Enforcement Act & Higher Education: or How I Learned to Stop Worrying and Love Wiretaps Terry Hartle American Council.
Information Privacy: Public Policy and Institutional Policies Wendy Wigen Policy Analyst, EDUCAUSE Copyright Wendy Wigen, This work is the intellectual.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
John Morris 1 Hot Topic - IP Services Wiretapping the Internet EDUCAUSE Policy Conference May 20, 2004 John Morris, Center for Democracy and Technology.
1 PARCC Data Privacy & Security Policy December 2013.
Privacy and Data Mining What Do “They” Know About You?
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
CALEA: The Big Picture for Higher Education ICPL June 28, 2006 Steve Worona EDUCAUSE
Regulatory Reporting and Compliance & VoIP Regulation Jonathan E. Allen Kristopher E. Twomey Rini Coran, PC Law Office of Kristopher E. Twomey, P.C
1 EDUCAUSE Mid-Atlantic Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit.
Getting Your House In Order: The FCC`s Filing Requirements and Enforcement Process Jonathan E. Allen Kristopher E. Twomey Rini O’Neill, PC Law Office of.
Information Security Planning Considerations for Telecommuting
Washington Update: Hot Topics in Federal Law & Regulation
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Cloud Computing Constituent Group Meeting Room 401 – 2:40 – 3:30pm
Higher Education Information Security Council
Enforcing Copyright on Campus Networks: Lessons Learned, Next Steps
Educause/Internet 2 Computer and Network Security Task Force
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
INF 103 MART Successful Learning/inf103mart.com
Using Social Media in the University Setting
Innovative Solutions from Internet2
CIO Constituent Group Meeting
Hot Topics:Mobility in the Cloud
Copyright Infringement: Don’t let it happen to you!
Data Security v. Data Privacy
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Confidentiality October 14, 2005.
Everything you need to know!
Collaborative Working & Best Practice
Data Security and Privacy
State Technology Updates
Data Security and Privacy
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Essentials of the legal environment today, 5e
Collaborative Working & Best Practice
Privacy and Data Mining
Privacy and Data Mining
4th Annual Conference on Technology and Standards Washington
World-Leading Research with Real-World Impact!
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
School of Medicine Orientation Information Security Training
Presentation transcript:

EDUCAUSE DC Policy Office Update Steve Worona MidWest Regional Conference March 15, 2011

Our Portfolio Federal policy issues Campus policy issues (ICPL) What keeps us awake at nights Campus policy issues (ICPL) What keeps you awake at nights And a few other things ACTI Network Council HEISC IDM WG dot-EDU administration EDUCAUSE Live! 2

16th ICPL Annual Seminar July 18-21 at Cornell “Students and Their Technology: Law and Policy, Today and Tomorrow” Highlights Dan Solove on data privacy and on cyber-repution Student IT policies from various campuses Compliance issues Tales from the e-counseling couch A cross-generational dialog Technology implications of student IT policy choices 3

2011 Security Professionals Conference April 4-6 in San Antonio (or online) “Setting a Course for Collaboration and Innovative Solutions” Keynotes Karen Evans: National Director, US Cyber Challenge Eran Feigenbaum: Director of Security, Google Apps Early registration cutoff: March 7 4

Current Issues Copyright & other IP Data-breach response Identity Management Accessibility Blended Curricula Tracking, assessment Privacy, privacy, privacy Network neutrality Use policies Outsourcing, cloud, … Access, affordability Research data State control, authority Compliance BTOP, ARRA, … Export control dot-EDU etc. 5

Current Issues Copyright & other IP Data-breach response Identity Management Accessibility Blended Curricula Tracking, assessment Privacy, privacy, privacy Network neutrality Use policies Outsourcing, cloud, … Access, affordability Research data State control, authority Compliance BTOP, ARRA, … Export control dot-EDU etc. 6

Copyright and Other IP We’ve finally put HEOA behind us, right? 7

Copyright and Other IP We’ve finally put HEOA behind us, right? Right? 8

Copyright and Other IP We’ve finally put HEOA behind us, right? IPEC report More aggressive enforcement, especially foreign Congress is anti-Czar Operation “In Our Sites” Several dozen domain name seizures 84,000 dolphins for 10 tuna COICA Potential campus impact 9

Privacy, Privacy, Privacy Commercial issues Congress, FTC “Do Not Track” In general, increasing concern Campus impact? ECPA issues Cloud computing Categorization of location info Campus impact CALEA II Mandatory wiretap-ability Fallout from Egypt 10

Privacy, Privacy, Privacy Commercial issues Congress, FTC “Do Not Track” In general, increasing concern Campus impact? ECPA issues Cloud computing Categorization of location info Campus impact CALEA II Mandatory wiretap-ability Fallout from Egypt Oh, yeah… FERPA 11

Network Neutrality Political philosophy: Who do you (dis)trust more? Free market Government Why care? Higher Ed connection with off-campus community In the FCC Open Internet rules In Congress House: No money to enforce Open Internet rules Various other override attempts In the Courts Challenge from AT&T and others 12

Current Issues Copyright & other IP Data-breach response Identity Management Accessibility Blended Curricula Tracking, assessment Privacy, privacy, privacy Network neutrality Use policies Outsourcing, cloud, … Access, affordability Research data State control, authority Compliance BTOP, ARRA, … Export control dot-EDU etc. 13

So, what’s keeping you up? 14

End 15