Download presentation
Presentation is loading. Please wait.
Published byAmberlynn O’Connor’ Modified over 7 years ago
1
Information Security Planning Considerations for Telecommuting
EDUCAUSE 2007 Zachery S. Mitcham, Presenter UNCW - Information Security Officer
2
PLANNING CONSIDERATIONS
Catalyst for Telecommuting Initiatives Pandemics (Avian Flu strain-H5N1) Catastrophic occurrence (Hurricanes, 911) Physical corporate growth restrictions (Schools located within cities)
3
PLANNING CONSIDERATIONS
Where is the telecommuter authorized to work from?
4
PLANNING CONSIDERATIONS
Selection of wireless and other home networking technology should meet IT security standards
5
PLANNING CONSIDERATIONS
Offsite users will not have advantage of the university’s onsite robust security infrastructure. Does the offsite wireless and broadband infrastructure meet IT security standards?
6
PLANNING CONSIDERATIONS
Is the university's VPN robust enough to support the telecommuting initiative? If not, what will it take and how long will it take to re-engineer it in order to accommodate the telecommuting initiative?
7
PLANNING CONSIDERATIONS
Who will conduct offsite security inspections and support for configuration compliance of the university's property?
8
PLANNING CONSIDERATIONS
How will you preserve Electronically Stored Information for the telecommuter under the Electronic Discovery provisions?
9
PLANNING CONSIDERATIONS
Information Security policies must be updated to address the handling of the university's sensitive and guarded information while offsite.
10
PLANNING CONSIDERATIONS
Role based-need to know information outside the office environments. Same safeguards must apply as on campus.
11
PLANNING CONSIDERATIONS
How would we prosecute Hackers gaining access to a telecommuters Electronic Data Processing equipment?
12
PLANNING CONSIDERATIONS
The challenge of managerial oversight and enforcement of information security of offsite telecommuter
13
PLANNING CONSIDERATIONS
Encryption software must be loaded on all telecommuting EDP devices; Where will funding for site license requirements for PC encryption software come?
14
PLANNING CONSIDERATIONS
All remote networks connected to the Internet via a broadband connection should have a firewall device installed
15
PLANNING CONSIDERATIONS
Web browsers should be configured in a manner to reduce vulnerability to intrusion
16
PLANNING CONSIDERATIONS
Operating system policies and configuration options should be selected to increase security
17
PLANNING CONSIDERATIONS
PC tracking software should be considered for all Electronic Data Processing devices that will process sensitive information.
18
PLANNING CONSIDERATIONS
How will government legislation and corporate regulatory requirements such as HIPAA, FERPA, CALEA, ECPA, PCI affect your telecommuting initiative?
19
Remember! When It Comes To Sec Y U+R+IT
20
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.