PRIVACY – A CIO’S VIEW Prepared by Chip German Presented to the Cornell/EDUCAUSE Institute for Computer Policy and Law 06.29.05.

Slides:



Advertisements
Similar presentations
I want to do a work placement... ERASMUS WORK PLACEMENTS : a practical checklist by Annette Strauss and Adele Browne.
Advertisements

Title IX Dr. Sheila Stearns, AGB Senior Fellow West Virginia Board of Governors Summit August 2, 2014 With thanks to Lucy France, General Counsel, University.
The Right Issues Exceeds Expectations Meets Expectations Needs Improvement N/A 1. The Board focuses on activities that will help the Company maximize shareholder.
Neighborhood Watch: University Compliance Developments related to Research Susan Rafferty, Interim Director Office of Institutional Compliance.
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
Guidance for Year 06 Track 1.0 ART Program Continuation Applications Tedd Ellerbrock, MD Team Leader, HIV Care and Treatment, GAP, CDC Barbara Aranda-Naranjo,
1 Strengthening the Governance of Social Security Communications Strategy Sue Ward.
Introduction to Enterprise Risk Management (ERM)
A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Powering Government for the 21 st Century. Introduction Reflections on the last 160 days.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Pieces and the Puzzle of IT Policy University Computer Policy and Law Program April 7, 2004.
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Glenn Hastedt, Chair Daisy Breneman, Academic Advisor.
Dr. Glenn Hastedt, Chair Daisy Breneman, Academic Advisor.
is the idea that governments draw their powers from the governed.
National Association of College and University Attorneys 1 November 11, 2009 NACUA Fall 2009 Workshop November 2009.
Peer Information Security Policies: A Sampling Summer 2015.
Access & Privacy Chairs’ Compliance Workshop January 10, 2013.
The Institutionalization of Business Ethics
2005 MASFAA CONFERENCE CHARLESTON, WEST VIRGINIA Ginny D’Angelo Vice President of Student Loans Commerce Bank Diane Lambart Fleming Associate Director.
Public Administration Jay Shaftitz & E. W. Russell
IT Risk Management, Planning and Mitigation TCOM 5253 / MSIS 4253
Institutional Research Compliance Juliann Tenney, JD Research Compliance and Privacy Officer Director, Institutional Research Compliance Program.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Compliance Office Director - Rudolph (Rudy) Green Training Coordinator - Kay Novello Sr. Administrative Associate- Cristy Oliver Required of all employees:
Corporate Responsibility and Compliance A Resource for Health Care Boards of Directors By Debbie Troklus, CHC and Michael C. Hemsley, Esq.
Organization, Roles and Responsibilities of the National CIO Office Karen S. Evans Administrator, Office of E-Government and Information Technology United.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Information Security Training for People who Supervise Computer Users.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
Patrick Sulzberger, CPA, CHC Compliance & The Board A Guide to Excellence.
The Department of Defense Intelligence Oversight Program
Advanced Compliance Strategies Taking the Existing Compliance Program to Another Level Gary F. Giampetruzzi Pfizer Corporate Compliance November 14, 2003.
Talking With The Boss About Security Darlene Quackenbush, James Madison University Shirley Payne, University of Virginia EDUCAUSE Security Professionals.
CEED Student Induction 2012 CEED Office Staff Adrienne HondrosAdministration Jeremy LeggoeDirector.
“Executive Departments & Cabinet” “Independent Agencies and Regulatory Commissions.
Records Management in Government Prepared by the Information Management Unit Saskatchewan Archives Board.
PP 620: Public Policy and Health Administration Unit One Seminar Kris R. Foote, J.D., M.P.A., M.S.W. Kaplan University.
Information Technology Acceptable Usage. What you should know… Employees provide the first and final defense in addressing and mitigating day-to-day security.
Department of Energy Energy Agency Reorganization Plan Little Hoover Commission Hearing on Governor Schwarzenegger’s Plan to Establish a Department of.
English for Engineering Management ( 1 ) Detail 1-1 Fill out the missing words on the drawing (5 are missing) Where is the detail located on the building?
EU General Data Protection regulation (GDPR)
The Institutionalization of Business Ethics
Dr. Glenn Hastedt, Chair Daisy Breneman, Academic Advisor
Chapter 9 Ethics and Professional Practice in IT
Information Technology Standards at the University of Illinois
"Praise Temple Ministries" Privacy Statement "Praise Temple Ministries" is highly sensitive to the privacy interests of consumers and believes that the.
Records Management New policies and procedures
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Dr. Glenn Hastedt, Chair Daisy Breneman, Academic Advisor
Success For Each Child & Eliminate The Opportunity Gap
Red Flags Rule An Introduction County College of Morris
Information Technology Policy Institutional Data Policy
Privacy Project Framework & Structure
“Presidential Advisers and Executive Agencies”
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
Helping the President To help the president with all of his/her many tasks, the “Executive Office of the President” (“EOP”) was created in This includes.
“Executive Departments & Cabinet” Chapter Six, Section Four – “Independent Agencies and Regulatory Commissions.
More GWAR Practice.
Presentation transcript:

PRIVACY – A CIO’S VIEW Prepared by Chip German Presented to the Cornell/EDUCAUSE Institute for Computer Policy and Law

PRIVACY – A CIO’S VIEW SOME BACKGROUND: Chip is VP for IT/CIO at the University of Mary Washington His address is and the University’s policy site is UMW is a public, liberal arts, master’s-level university in Virginia

PRIVACY – A CIO’S VIEW INSTITUTIONAL POLICY CONTEXT: Usually little constituent interest in the details of this kind of policy Significant policy experience fills vacuum Important: emphasis on policy setting not as a defensive measure but as an opportunity to express institutional character and values

PRIVACY – A CIO’S VIEW STATE OVERSIGHT CONTEXT: State government (first “cabinet-level” Secretary of Technology in US) believes it has authority on all IT issues, including privacy and security Corporate perspective dominates (citizen oversight boards populated by corporate IT officers)

PRIVACY – A CIO’S VIEW STANDARD CUSTOMER-ORIENTED PRIVACY: e.g. Gramm-Leach-Bliley compliance – e.g. state-mandated web-site policy – efforts to reduce use of SSNs usually not specific to institutional character and values – defensive policy

PRIVACY – A CIO’S VIEW PRIVACY, EMPLOYEE “RIGHTS” AND ACADEMIC FREEDOM: Rigorous process for DMCA or for investigative/legal discovery – – /it_security_incident_respo.phphttp:// /it_security_incident_respo.php

PRIVACY – A CIO’S VIEW PRIVACY, EMPLOYEE “RIGHTS” AND ACADEMIC FREEDOM : Drawing lines on monitoring that are appropriate to the academic enterprise – – _case_death_or_serious_d.phphttp:// _case_death_or_serious_d.php

PRIVACY – A CIO’S VIEW POLICY AS EXPRESSION OF CHARACTER: Affirmative Driven by a deep understanding of the values worth preserving, sometimes against a tide of emotion Resonant with cultural touchstones, i.e.: –