A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Northside I.S.D. Acceptable Use Policy
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
DSpace: the MIT Libraries Institutional Repository MacKenzie Smith, MIT EDUCAUSE 2003, November 5 th Copyright MacKenzie Smith, This work is the.
While You Were Out: How Students are Transforming Information and What it Means for Publishing Kate Wittenberg The Electronic Publishing Initiative at.
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
The Academic Computing Assessment Data Repository: A New (Free) Tool for Program Assessment Heather Stewart, Director, Institute for Technology Development,
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Data Ownership Responsibilities & Procedures
TESL Ontario Conference October 28 & 29, Project Team Project Lead - Carolyn Cohen Research Lead - Antonella Valeo Research Consultants - Sheila.
Uintah School District Acceptable Use for Computer and Network Access.
Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Riverside Community School District
Method: systematically gather citations by KU faculty and approach those faculty for permission to deposit on their behalf articles published in journals.
Academic Data Research Services Alliance Bridging the Gap between Data and Discovery Beth Forrest Warner Director, Digital Library Initiatives, University.
Ownership of Intellectual Property: Textbooks and Inventions Frank Lancaster UT Office of the General Counsel Presented at The University of Tennessee.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
INTERNET and CODE OF CONDUCT
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Risk Assessment 101 Kelley Bradder VP and CIO Simpson College.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Copyright - L. Thanasides, 2002 Using the Right FACTS Can Be Informative: Florida’s Statewide Student Information System Linda Thanasides Marsha Stickel.
1 Outsourcing Student & Other Collaboration Services Wendy Woodward Director, Technology Support Services Copyright Wendy Woodward This work.
Putting the We in… We are Penn State! Copyright [Carol Findley, Lisa Dibert] [2003]. This work is the intellectual property of the authors. Permission.
Intellectual Property Protocol and Assessment for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the.
EDUCAUSE April 25, 2006Enforcing Compliance with Security Policies … Enforcing Compliance of Campus Security Policies Through a Secure Identity Management.
Lynette Olson, Assessment & Effectiveness Director & Gary Langer, Associate Vice Chancellor, Office of the Chancellor, Minnesota State Colleges and Universities.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Serving MERLOT on Your Campus Gerry Hanley California State University and MERLOT Seminars on Academic Computing August 7, 2002 Snowmass CO Copyright Gerard.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
HumaniTech®: Educause, Seattle October 24, 2007 Bridging Divides, Building Collaborations
Examples of problems with teacher/school site violations: A company’s logo and link on footer of homepage when company is not their business partner—only.
Copyright Your rights, the law, and the rights of others.
Managing Intellectual Property for Distance Learning Liz Johnson Project Manager Advanced Learning Technologies Board of Regents of the University System.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Electronic Use Policies.   Social Media  Internet.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
NERCOMP 2002 Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith University Registrar University of Connecticut.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
Digital Citizenship Created By: Kelli Stinson June 2011.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Yours, Mine and Ours: Copyright in Cyberspace 2005 National LTAP Conference July 26, 2005 Nita Lovejoy Iowa State University.
Policy Pickles at Sueme U Seminars in Academic Computing 2005 – Case 5.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Bringing IT All Back Home Centralized Systems in a Decentralized.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Improving the Social Nature of OnLine Learning Tap into what students are already doing Tap into what students are already doing Educause SWRC07 Copyright.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
Legal Issues in the “E-Learning Business” Jonathan Alger University of Michigan October 29, 2001 Copyright Jonathan Alger This work is the intellectual.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Acceptable Use Policy (Draft)
Decentralization in a Centralized IT Environment
Confidentiality October 14, 2005.
myIS.neu.edu – presentation screen shots accompany:
Student User Agreement and Policy 2022
Presentation transcript:

A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001

Copyright Marilu Goodyear and Beth Forrest Warner, This work is the intellectual property of the authors. Permission is granted for this material to be shared for non- commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the authors. To disseminate otherwise or to republish requires written permission from the authors.

University Environment Resistant to change Diffuse and collaborative decision- making processes Differing levels of technology use and understanding

University Values and Mission Core values: Teaching Research Mission: Teaching students Contributing to the growth of knowledge Means of accomplishing the mission? Constantly changing…

Key to Successful IT Policy Consistent with University values and mission Developed through consensus Explicit issues Informed participants

Where to Begin? Lists of complaints and problems vs. A shared framework of values

Underlying Requirements Articulated values of the university Informed participants in the policy process

The University of Kansas Established 1866 Comprehensive educational & research environment 27,800 students 2,000+ faculty Distributed campuses / facilities 14 major academic divisions Carnegie Research University I

Information Technology at KU Central and distributed IT services Central services include: Academic computing support University web services Supercomputing Enterprise systems (PeopleSoft) Network and telephone systems Datawarehouse development Library and Digital Library services Printing and mail services

KU’s IT Policy Responsibilities Vice Chancellor for Information Services Issues include: Copyright infringement (DMCA) harassment Commercial services on the University network And, lots more…

KU’s Policy Framework Access Freedom of expression Privacy Intellectual Property Security Effective use of resources Records management

Access: Open Flow of Information The University maintains access to local, national, and international sources of information and communication mechanisms for the expressed purpose of supporting the teaching, research, and service mission of the University. Information resources will be used by members of the community with respect for the public trust through which they have been provided and in accordance with the law and policies established by the State of Kansas, the Board of Regents, and the University and its operating units.

Access Access to systems, i.e. eligibility for services Domain name use Remote access Solicitation

Freedom of Expression Freedom of expression and an open environment to pursues scholarly inquiry and for sharing of information are encouraged, supported and protected at the University of Kansas. Censorship is not compatible with the goals of the University. The University will not limit access to any information based on its content, which meets the standard of legality.

Freedom of Expression Freedom of speech Exceptions Libel Slander Harassment Commercial & personal use of resources Advertising Obscenity

Privacy The general right of privacy is extended to the extent possible to the electronic environment. The University and all electronic users should treat electronically stored information in individual files as confidential and private. Content should be examined or disclosed only when authorized by the owner, approved by an appropriate university official, or required by law.

Privacy Exceptions for Open Records Effective administration Administrative review Legal search warrants

Intellectual Property U.S. Constitution: “promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors exclusive Rights to their respective Writings and Discoveries.” Rights of the creator vs. rights of users Current copyright controversy…

Intellectual Property The University supports the production of intellectual property by faculty, staff and students for the benefit of the institution and society. All users of electronic information have a personal responsibility to recognize and honor the intellectual property of others. Plus – concepts and responsibilities of Fair Use

Security Academic and administrative information processing, telecommunications, and related technology are critical academic and business tools of the University of Kansas. Inappropriate exposures of confidential and/or sensitive information, loss of data, inappropriate uses of computer networks, and risks of physical damage can be minimized by compliance with reasonable standards, attention to the proper design and control of information systems, and sanctions for violations of security policy.

Security Practices Passwords Virus protection Other measures…

Effective Use of Resources The University provides information technology resources to the campus community for everyone’s use. These assets should be used equitably and responsibly. The University expects all users to be effective network citizens. The University attempts to maintain high performance of these resources for the benefit of all. Individual users or processes may be identified as using an inordinate amount of resource. Priority is always given to activities that support the University’s mission of instruction, research, and service. Non-academic student use will receive a lower priority.

Effective Use of Resources Disruptive Network Traffic Limitations on: Broadcast Messages Peer to peer software use Chain mail

Records Management New information technologies have transformed the ways Universities create, use, disseminate, and store information. These new technologies offer a vastly enhanced means of collecting information for and about members of the University community, communicating with state government, and documenting the business of the University. It is the University’s obligation to manage and preserve its records to document our history and to provide access to the citizens of Kansas.

Records Management Definition of public records Open Records process Records retention policies & processes Guidelines for electronic mail use and retention

Policy Website Organization Policy language + Background & contextual information = Informed participants

Policy Information Organization Policy language University policy Board of Regents policy State laws and/or regulations Federal laws and/or regulations State and Federal court decisions Other relevant background information

Resources Referenced THOMAS Legal Information Institute FindLaw U.S. Copyright Office UT System Intellectual Property website Local University and State websites

Delivery Mechanism Easy access Easily updated Easy to include relevant background information Feedback mechanisms

Policy Stakeholders

Development Process Identify stakeholders Identify existing policy and relevant background information Develop new policy language Invite review and feedback via website Revise as needed

Conclusions Process works to: Create essential IT policy language Highlight gaps in non-IT policy language Initiate discussions of responsibilities Develops sense of shared ownership Reinforces recognition that technology is a means to an end – not the end itself Reinforces sense of shared values Results in consistent and enduring policies

Questions??? Marilu Goodyear Beth Warner University of Kansas, IT Policy Website