Cosponsoring Organizations EDUCAUSE American Association of Community Colleges American Association of State Colleges and Universities American Council.

Slides:



Advertisements
Similar presentations
Wi-Fi Hotspot Guide Wi-Fi Hotspot feature lets you connect & share phones data connection (2G or 3G) to other five Wi-Fi devices through Wi-Fi This is.
Advertisements

Negotiating the Internet: Equipment and Beyond David Bankowski IT Manager, Electronic Communications 25 July 2008 Insert graphic.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Northside I.S.D. Acceptable Use Policy
SCCC Technology & Information Systems. Technology Support Academic Academic –Campus Educational Technology Units (ETUs) –Teaching & Learning Centers –Distance.
Unit 5: The Executive Branch
First-Time Attendees: How to Get the Most Out of the Conference Experience Gary Dobbins Program Chair, Security 2008 Director, Information Security University.
Campus Approaches to Improving Cyber Security Awareness Presented by: Krizi Trivisani, Chief Security Officer The George Washington University EDUCAUSE.
Millennials in the Library: Today's Student Library Worker Customer Service Training for Student Assistants in Public Services Mangala Krishnamurthy University.
1 © 2003 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID THE NETWORK SECURITY CHALLENGE Jack Suess CIO University of Maryland Baltimore.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
Information Technology Resource Use Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Information Privacy and Security Quiz! Information Security Office Adapted with permission from the Educause and Internet 2 Information Security Task Force.
Investigating Allegations of Staff Sexual Misconduct With Inmates Action Planning Work Guide The American University, Washington College of Law National.
Investigating Allegations of Staff Sexual Misconduct With Inmates Action Planning The American University, Washington College of Law National Institute.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess February 3, 2004.
First-Time Attendees: How to Get the Most Out of the Conference Experience Tammy Clark Program Chair, Security 2007 Chief Information Security Officer.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
An Introduction to EDUCAUSE and the EDUCAUSE/Internet2 Security Task Force Steve Worona Director of Policy and Networking Programs EDUCAUSE CISSE Washington,
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
2007 Program Committee Kevin Amorin Harvard University Beth Binde Rutgers, The State University of New Jersey Tammy L. Clark, Chair Georgia State University.
CALEA Discussion EDUCAUSE MARC Conference Wilson Dillaway, Tufts University Doug Carlson, New York University January 18th, 2007.
Bring Your Own Technology Stafford County Public Schools B – Be Responsible Y – Yours to Manage O – Observe Usage Guidelines T – Technology = Access.
Digital Literacy Workgroup of the Minnesota Learning Commons Mary Ann Van Cura, Workgroup Chair State Library Services, Minnesota Department of Education.
THE HIGHER ED LOBBY IN WASHINGTON: WHAT’S THAT ALL ABOUT? By Jeff Vincent Assistant Vice Chancellor for Federal Relations Vanderbilt University The National.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
CALEA Discussion Internet2 Joint Techs July 19, 2006 Doug Carlson Executive Director, Communications & Computing Services New York University
Association for Institutional Research IPEDS Training Enhancing knowledge. Expanding networks.
Association for Institutional Research IPEDS Training Terrence Russell, PhD Executive Director, AIR Enhancing knowledge. Expanding networks.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
© 2006 SHRM SHRM Weekly Online Survey: June 27, Hurricane Season Sample comprised of 283 randomly selected HR professionals. Analyzing 283 responses.
NETWORK ADMINISTRATOR. EXAMPLES OF SOME COMPUTING RELATED CAREERS Multimedia Artist / Graphics Artist Information System Manager Computer Scientist Network.
NERCOMP Security Architectures SIG 24 September 2007 Worcester, MA.
Policy and IT Security Awareness Amy Ginther Policy Develoment Coordinator University of Maryland Information Technology Security Workshop April 2, 2004.
Serving the Campus Sustainability Community Association for the Advancement of Sustainability in Higher Education.
Welcome and Introduction to the Security Task Force Joy Hughes Co-Chair, Security Task Force Vice President and Chief Information Officer George Mason.
Networking 2001 Washington DC April Networking 2001 is sponsored by: American Library Association (ALA) Association of Research Libraries (ARL)
Cyberethics, Cybersafety, and Cybersecurity (C3): Implications for the Classroom Teacher Amy Ginther Project NEThics Director; Policy Develoment Coordinator.
EDUCAUSE LIVE EDUCAUSE/Internet2 Computer and Network Security Task Force Update Jack Suess January 21, 2004.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
Pipeline Safety Trust National Pipeline Safety Conference New Orleans, LA An Overview of the Pipelines and Informed Planning Alliance (PIPA) Report November.
Desktop Security: Making Sure Your Office Environment is Secure.
© 2010 Pearson Education, Inc. | Publishing as Prentice Hall. Computer Literacy for IC 3 Unit 3: Living Online Chapter 1: Understanding the Internet.
High Performance Computing - Starting out Small EDUCAUSE Campus Cyberinfrastructure Workshop Snowmass, CO August 5, 2006 Bonnie Neas Interim Deputy CIO.
Welcome and Introduction to the Security Task Force Peter Siegel Co-Chair, Security Task Force Chief Information Officer and Vice Provost University of.
Association for Institutional Research Association for Institutional Research IPEDS Training Enhancing knowledge. Expanding networks.
NMI-EDIT AND Small College Security & ID Management Issues Discussion John Bruggeman, Director of Information Systems, Hebrew Union College-Jewish Institute.
Welcome to P3 Connect 2015!. Gold Event Sponsor Silver Event Sponsor.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
OMICS International welcomes submissions that are original and technically so as to serve both the developing world and developed countries in the best.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
National Broadband Policy Federal Communications Commission State and Local Government Workshop September 1, 2009 Lori Sherwood Cable Administrator Howard.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
IT Trends in Higher Education Mark Luker ACE Fellows June 5, 2005.
Continental Security What can Academics contribute?
City Attorney’s Office THE RALPH M. BROWN ACT. City Attorney’s Office “Open and Public” Ralph M. Brown Act (Cal. Gov’t Code §§ et seq.) "All meetings.
Information Technology Acceptable Use An Overview
EDUCAUSE/Internet2 Computer & Network Security Task Force
The Utah Education Network Calling All Charter Schools
IT Information for Graduate Students
Strengthening CIO and CISO Collaboration on Security and Privacy
Student Monmouth College
IT Information for Graduate Students
CybersecuritySummit 2007 for NSF Large Research Facilities
IT Information for Graduate Students
IT Information for Graduate Students
Presentation transcript:

Cosponsoring Organizations EDUCAUSE American Association of Community Colleges American Association of State Colleges and Universities American Council on Education American Library Association Association of American Universities

Cosponsoring Organizations Association of Research Libraries Association for Communications Technology Professionals in Higher Education Coalition for Academic Scientific Computation Coalition for Networked Information Computing Research Association (cont’d)

Cosponsoring Organizations Internet2 National Association of College and University Attorneys National Association of College and University Business Officers National Association of State Universities and Land-Grant Colleges (cont’d)

EDUCAUSE Staff Here in DC to Help You! Becky Granger Information Technology Kate McTurk Registration/Member Services Representative Kerri Sherwood Meeting Planner Valerie Vogel Security Task Force Project Assistant

Notable Upcoming Events EDUCAUSE/Cornell Institute for Computer Policy and Law Annual Seminar 2007 July 24–27, 2007, Ithaca, New York EDUCAUSE/Internet2 Security Professionals Conference 2008 May 4–6, 2008, Arlington, Virginia (Held concurrently with Policy 2008)

Conference Connectivity Wireless access is available. SSID: ibahn_confAccess Code: 01324A Please be respectful of bandwidth usage. The connection is shared by everyone. Make sure your virus protection is enabled and all security patches are installed on your system.

Have a cell phone or beeper? Please set it to vibrate or turn it off. 

Policy 2008 May 7–8, 2008 Arlington, Virginia (Held concurrently with the EDUCAUSE/Internet2 Security Professionals Conference 2008) Save the Date