Sorting out IT Policy at Poly U. Ron Heasley Will Krause Tim Logan Mary Schoeler.

Slides:



Advertisements
Similar presentations
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Information Technology Awareness Wayne Donald IT Security Officer.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
Security, Privacy, Copyright, and Other Institutional Policy Implications of Online Learning Rodney J. Petersen, J.D. Policy Analyst & Security Task Force.
Making Sense out of the Information Security and Privacy Alphabet Soup in terms of Data Access A pragmatic, collaborative approach to promulgating campus-wide.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
Woodland Hills School District Computer Network Acceptable Use Policy.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
Property of CampusGuard Compliance With The PCI DSS.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
Information Security Policies and Standards
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Protecting ICT Systems
Securing Information in the Higher Education Office.
Information Security Training for Management Complying with the HIPAA Security Law.
General Awareness Training
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
Securing the System A K-12 Case Study. Background Rural School District 93% Free and Reduced Lunch 1100 students 3 Schools 1 Systems Administrator.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
An Educational Computer Based Training Program CBTCBT.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Keeping you Running Part II Developing Your Own Local Government Cyber Security Plans Stan France & Mary Ball
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Cyber Security & Fraud – The impact on small businesses.
Stanford Computer Security and You . Higher Education  Higher education environment is open, sharing, exploratory, experimental  Many information assets.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Policy Pickles at Sueme U Seminars in Academic Computing 2005 – Case 5.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Data Security.
Network Security & Accounting
Pro-active Security Measures
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
INFORMATION SECURITY AWARENESS Whose Job is it Anyway? Ron Freedman Ron Freedman Vice President VCampus Corporation Scott Wright Scott WrightPresident.
Information Security Services. Overview  Administrative Systems Security  Legislative Requirements  SUNet Security  Individual Security Awareness.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Protect Your Good Name Reduce your Risk of Identity Theft.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Information Security: Current Threats Marc Scarborough Information Security Officer
Woodland Hills School District Computer Network Acceptable Use Policy.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Information Security Program
Institutional Privacy Challenges
Model Contract for Health
Support and requirements for Research and Innovation
How it affects policies and procedures
Woodland Hills School District
Presentation transcript:

Sorting out IT Policy at Poly U. Ron Heasley Will Krause Tim Logan Mary Schoeler

Acceptable Use Policy All university mainframe computer systems and terminals must be used for institutional purposes only.

Headlines From The Nation’s Newspaper Alumni Data Stolen from Poly U. Profs Computer at Poly U. Confiscated For Child Porn RIAA Ranks Poly U. #1 In Violations

Acceptable use Protection of Personal Data Credit Card, SSN, FERPA, HIPAA, GLBA CopyrightDMCA System SecurityViruses, hackers Intellectual Property Research, patents, TEACH Act Other , commercial use of IT resources Areas of Concern

What is IT Doing? –Campus firewall –Pushing out virus definitions –System software updates –Daily backups What is the CFO Doing? –GLBA –Internal Audit –HR Policies –Risk Management

We need clear policy statements on: Acceptable use Protection of personal data Copyright System security Intellectual property

Why have a Policy? Preserve and protect institution Create rules of citizenship

Process Committee(s) for policies –Scope –Responsible office –Consequences Procedures Education and Awareness Campaign –Training for faculty, staff and students –Required Training? Ongoing Updates of Policies Timeline/Budget Sample Policy

Future Headlines From The Nation’s Newspaper