Policy Development at Georgetown: Directory Enabled Applications (and not) Charles F. Leonhardt CSG Winter Meeting Sanibel Harbour,

Slides:



Advertisements
Similar presentations
Planning Collaborative Spaces in Libraries
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Office of Information Technology Affiliates/Guests – Who are these people and how do we give them services? Copyright, Barbara Hope, University of Maryland,
Strategies for Crafting Effective IT Security Policies CIO Forum March 12, 2003 Dennis Maloney & Marin Stanek The University of Colorado at Boulder.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
1 Planning And Electronic Records Issues For Electronically Enhanced Courses Jeremy Rowe Nancy Tribbensee
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
UCB Enterprise Directory Services. Directory Services – Project History  Requirements defined  Project commission & goals articulated  Project teams.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
VISD Acceptable Use Policy
Imperial College Web Review Imperial College.... An audience-focused realignment of our web strategy with our College strategy, our market, technology.
SMALL BUSINESS MANAGEMENT Chapter 9 Small Business and Electronic Commerce.
WELCOME TO THE PROCUREMENT SEMINAR Procurement and Contracts An Overview of Contract Administration.
1 Tuesday, August 16, 2005 W E B C A S T August 16, 2005 Policy Development Theory & Practice: An Emphasis on IT Pat Spellacy Director of Policy & Process.
Identity Management – Why and How Experiences at CU-Boulder Copyright Linda Drake, Director of Development and Integration, University of Colorado, Boulder,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Educause 2006, Dallas TX What does a University need from Access Management? John Paschoud InfoSystems Engineer, LSE Library London School of Economics.
7 New Acceptable Use Policy. AUP Sections 2460 Purpose.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
2009 NWCCU Annual Meeting Overview of the Revised Accreditation Standards and New Oversight Process Ronald L. Baker Executive Vice President and Director,
Who’s Who and What’s What in the University Directory at Georgetown Common Solutions Group Spring Meeting University of Chicago May 9, 2002 Charles F.
Introduction to Grouper Part 1: Access Management & Grouper Tom Barton University of Chicago and Internet2 Manager – Grouper Project.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
An Educational Computer Based Training Program CBTCBT.
LENORE ENGLAND ASSISTANT DIRECTOR, ELECTRONIC RESOURCES MANAGEMENT UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE AUGUST 4, 2014 MLA TSD E-Resources Boot Camp:
Group Management at Brown James Cramton Brown University April 24, 2007.
Chapter 8 The Internet: A Resource for All of Us.
Integrated Marketing and Communications Workshop Part I: Web Site Structure and Development Where excellence and opportunity meet.™ Presented by: Integrated.
Module 9 Configuring Messaging Policy and Compliance.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
E-Business Activities at the University of California, Berkeley Barbara H. Morgan Director, Strategic Technology Planning Common Solutions Group Tucson,
Auditing Information Systems (AIS)
Policy Pickles at Sueme U Seminars in Academic Computing 2005 – Case 5.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
The Savvy Cyber Teacher ® Using the Internet Effectively in the K-12 Classroom Copyright  2003 Stevens Institute of Technology, CIESE, All Rights Reserved.
Case Google Mail Planning for the move to Case Google Apps ( , Docs, Sites)
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
PatentScope - Electronic Publication World Intellectual Property Organization.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Center for Planning and Information Technology T HE C ATHOLIC U NIVERSITY of A MERICA Bringing IT All Back Home Centralized Systems in a Decentralized.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
ITCC / IT Retreat Data Access Procedure December 10, 2009 Karl F. Lutzen Information Security Officer.
Internet Engineering Course Outline. Internet Engineering Course; Sharif University of Technology Aims and Contents To attain necessary skills for handling.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Managing Access at the University of Oregon : a Case Study of Scholars’ Bank by Carol Hixson Head, Metadata and Digital Library Services
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
The Evolving Scholarly Record in the Campus Context Sarah M. Pritchard March 23, 2015.
Bringing it All Together: Charting Your Roadmap CAMP: Charting Your Authentication Roadmap February 8, 2007 Paul Caskey Copyright Paul Caskey This.
Records Management in Government Prepared by the Information Management Unit Saskatchewan Archives Board.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Berkeley Lab Software Distribution Site NLIT Dan Pulsifer - Engineering May 11 th, 2008.
Information Technology Overview Welcome to NC State!
Blackboard Security System
Office of Information Technology October 18, 2016
Hiring Student Employees
How ICT is used Businesses, Organisations and Individuals use Information Technology in many ways.
IS4680 Security Auditing for Compliance
Digital Library and Plan for Institutional Repository
Information Technology Organization Overview RFP #220-05
Digital Library and Plan for Institutional Repository
Presentation transcript:

Policy Development at Georgetown: Directory Enabled Applications (and not) Charles F. Leonhardt CSG Winter Meeting Sanibel Harbour, Florida January 11, 2002

Brief History  Seven Years Ago: No Formal IT Policies –University IT Functions too decentralized –Nine Internal Service Providers –Five, count ‘em, five “CIOs”  Burning Need for Acceptable Use Policy  One Year to Develop  One Year for Faculty Senate to debate and approve

The last 5 Years: many needs for new and revised policies  Computer Systems Acceptable Use Policy  More “global” policies, such as privacy and security  More “functional” policies such as domain naming (e.g. Upenn.georgetown.edu was requested!)  The major focus for today: Conducting Business over the Internet

Policy Overview  Computer Systems Acceptable Use Policy Approved: 1996 Application: Campus-wide Audience: all students, faculty, staff, affiliates, alumni Ancillary Policy: Policy For System and Network Administrators Action: needs review and revision in view of “Internet explosion” and new technologies

Policy Overview Related Policies (Global)  Privacy Policy Need to provide a University philosophy and umbrella policy to guide existing departmental privacy policies (Med School, Registrar, Registrar, Library, etc.) (out of date and needs revision)  Security Policy External auditor and Board of Directors mandated (being revised – a VERY long process)

Policy Overview Related Policies (Global)  Intellectual Property and Technology Transfer Revision under review  Electronic Resources Access Policy Who can use Georgetown’s online resources? In Development  Copyright Needs review and updating

Policy Overview Related Policies (Functional)  retention policy Face the realities of purging  Software Licensing and Acquisition Policy More formally prohibit software copying and support licensing  Naming policy Philosophy for naming subdomains, servers, etc.  Off-campus Equipment and Data Access companion to HR “work at home” policy

A New Policy Process  Articulate a clear, concise rationale for the establishment of the policy  Name a process owner  Establish the working group  Establish a timeline  Determine whether interim policy is needed  Establish the approval process  List all other (potentially) affected policies

Policies Done in 2001  Internet (Web) Business Policy –Philosophy –Guidelines for Departments Selling Goods and Services  Web Advertising Policy  distribution policy –Voluntary and Involuntary mailing lists –An “interim” policy

Policy Development: 2002  Account Management  Directory and Attribute Use Policy –(e.g. Calculation of Primary Affiliation)  Identification & Authentication Policy –Very complex and urgently needed  Policies being contemplated: B2B Vendor Compliance Policy

A Common Solution?  We are not unique  Policy situations are not unique  A more formalized common repository of policy drafts for: –Directory driven applications –Cross-institution authentication and authorization –“Global” issues

More Information  University Policy Information:  Technology Policy Information:  University Policy Search Engine:  Copies of Policy Drafts Not Yet Published: