Ten Years of ICPL From the Cornell Perspective 1.

Slides:



Advertisements
Similar presentations
Knowledge Management at the Gordon – Staff Portal Project Presented by Deirdre Carmichael 12 September 2008.
Advertisements

Information Technology Environmental Scan Information Sources State of Maryland, USM, MHEC IT Plans SU IT Plan,Tech Fluency Policy, and 2001 Tech survey.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
Outcomes By the end of this session, participants will be able to:
Serving Utah’s Online and Distance Learners Carol Hansen – Weber State University Sally Patrick – Emporia/SLIM, WSU & Eccles Eve Tallman – Grand County.
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
Stewardship and Custodianship of Electronic Mail Office of Information Technologies University Computer Policy and Law Program Office of Information Technologies.
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
Making the GRADE: Improving Access to E-Learning EDUCAUSE Southeast Regional Conference June 8, 2004.
Legal, Policy and Regulatory Challenges for IT Executive Leadership/Seminars on Academic Computing Tracy Mitrano Cornell University Executive Leadership/Seminars.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
ETDC 625 Hardware and Software in Instructional Development Spring 2012 Raymond Nekrasz.
Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, This work is the intellectual property of the authors. Permission is granted.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Baylor University and Xythos EduCause Southwest 2007 Dr. Sandra Bennett Program Manager Online Teaching and Learning System Copyright Sandra Bennett 2007.
Computer Science – Information Literacy Seminar ODUCS Information Literacy.
Super Quick Guide to Your Ivy Tech Library To access Library resources, log in to Campus Connect and select the Library tab. Or, log in to Blackboard and.
Privacy and Security Risks in Higher Education
The Scales of Justice Balancing Policy and Law Against Expectations in Real-Life Computer Abuse Cases.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Cornell 18,000 students 2,000 faculty Twelve colleges on Ithaca campus Four are state colleges, eight are private (including grad school and school of.
 Google Apps for Education Is it right for you?.
SPEED COPYRIGHT (The Copyright Quickie) 2003 Rosemary Chase Copyright Officer George Mason University Libraries
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
PlanetLab Policies: Learning on the Job Larry Peterson Princeton University.
Higher Education Initiatives (with tips for your implementation!) Merri Beth Lavagnino Chief Privacy Officer and Compliance Coordinator Indiana University.
Affordable Learning Solutions and a Taste of MERLOT Gerry Hanley, Ph.D. California State University Office of the Chancellor Academic Technology Services.
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator.
Creating Digital Storybooks
Implementation and Policy of Rate Based Billing at Cornell Tracy Mitrano R. David Vernon.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Privacy and Data Mining What Do “They” Know About You?
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
10 Best Uses of Internet in Teaching and Learning Jennifer Lassiter.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
CALEA: The Big Picture for Higher Education ICPL June 28, 2006 Steve Worona EDUCAUSE
The Evolving Scholarly Record in the Campus Context Sarah M. Pritchard March 23, 2015.
HathiTrust Language Count Our bet with Google requires patience.  Access to Google scans of non-English language imprints in our libraries will come.
Chapter 4: Laws, Regulations, and Compliance
Greater Visibility, Greater Access QSpace QSpace Queen’s University Research & Learning Repository.
Launching E-Records with a PERPOS: The Presidential Electronic Records PilOt System 2005 NAGARA Annual Meeting.
EDUCAUSE Seminars in Academic Computing Executive Leadership Seminar Aug. 3-5, 2007 Susan Perry, Senior Advisor The Andrew W. Mellon Foundation Indiana.
Facilitated and compiled by UCSF School of Medicine Office of Educational Technology -Updated March 16, 2016 / Page 1 UCSF Student.
LRC Network Planning for Records Management improvement Kathryn Dan, GM University Records and Policy.
Records management and cloud computing Records Services LRC meeting September 2012.
Washington Update: Hot Topics in Federal Law & Regulation
EDUCAUSE DC Policy Office Update
Using Social Media in the University Setting
Document & Web Content Management
Managed IT Service Providers - Endecom.com
Check Out for Data Backup and Recovery - Endecom.com
FOIA Teach-In University of Illinois--Chicago Fall, 2016
This presentation uses a free template provided by FPPT.com MSP IT Services in Connecticut
21st Century Learning Spaces
This presentation uses a free template provided by FPPT.com Computer Support and Services in Connecticut
This presentation uses a free template provided by FPPT.com Professional Security Systems Ct.
This presentation uses a free template provided by FPPT.com New Office IT Setup Services
Privacy and Data Mining
Privacy and Data Mining
This presentation uses a free template provided by FPPT.com IT Consulting Services Endecom.com.
This presentation uses a free template provided by FPPT.com Network Consulting Services in Connecticut Endecom.com.
This presentation uses a free template provided by FPPT.com Check Out for Computer Support and Services Endecom.com.
This presentation uses a free template provided by FPPT.com Computer Support Services in Connecticut Endecom.com.
Presentation transcript:

Ten Years of ICPL From the Cornell Perspective 1

The Original Format IT Policy Development – Substance and Process and Template Cornell Policy Office spin off Security – Script kitties to Fraud and Abuse Act EDUCAUSE Security Professionals spin off Copyright – P2P DMCA Copyright Extension Act – Use in teaching and learning Teach Act

New Directions Mid-Course Themes – Cloud Computing 2009 – IT and Library Collaboration 2010 – Technology and Student Life 2011 National Policy Issues – Copyright and HEOA – Patriot-Act, CALEA 3

Higher Education: Canary in the Coal Mine Broadband Deployment Electronic Surveillance – Revision of the Electronic Communications Privacy Act Free Speech – Communications Decency Act to Speech on Campus Copyright/ Georgia State Google Books, Google Buzz and Google Search 4

On the Cusp: Privacy and Reputation Facebook and Gossip Sites – Thoughts, Counseling and Action FERPA – What faculty, students and staff need to know FOIA and Open Records – What faculty students and staff need to know Privacy practices – Complementary privacy and security practices 5