Presentation is loading. Please wait.

Presentation is loading. Please wait.

Management of Data as Responsible Use ICPL 2005. Information Privacy and Security As usual in higher education, different institution will have, and take,

Similar presentations


Presentation on theme: "Management of Data as Responsible Use ICPL 2005. Information Privacy and Security As usual in higher education, different institution will have, and take,"— Presentation transcript:

1 Management of Data as Responsible Use ICPL 2005

2 Information Privacy and Security As usual in higher education, different institution will have, and take, different approaches to the protection, preservation, and proper use of their IT resources and assets: –Hardware –Software –Data

3 Privacy and Security Security and Privacy Security –Administrative Program –Logical Availability Integrity Confidentiality –Physical Locks and Keys Privacy –Transparency Data collected/stored Relevancy –Disclosure Notice –Control Correct Mistakes Opt-In or Out –Security Administrative Logical Physical

4 Data… Is at the core of the intersection between security and privacy, not least in the experience of information technologies.

5 Comprehensive Information Security Policies UC-Berkeley Framework –http://ist-socrates.berkeley.edu:2002/pols.htmlhttp://ist-socrates.berkeley.edu:2002/pols.html UCOP –http://www.ucop.edu/ucophome/policies/bfb/is3.pdfhttp://www.ucop.edu/ucophome/policies/bfb/is3.pdf Princeton –http://www.princeton.edu/~protect/PoliciesAndGuidelines/Info SecPolicy05-21-2004.pdfhttp://www.princeton.edu/~protect/PoliciesAndGuidelines/Info SecPolicy05-21-2004.pdf Chicago –https://security.uchicago.edu/regulated- computers/policy.shtml

6 Data Classification and Stewardship Classification –http://www.stanford.edu/group/security/clas sification/classification_of_data.htmlhttp://www.stanford.edu/group/security/clas sification/classification_of_data.html Stewardship –http://www.itc.virginia.edu/policy/itcadmina ppendixa.htmlhttp://www.itc.virginia.edu/policy/itcadmina ppendixa.html –http://www.web.virginia.edu/iaas/data_catal og/institutional/data_digest/datadigest.htmlhttp://www.web.virginia.edu/iaas/data_catal og/institutional/data_digest/datadigest.html

7 Cornell IT Policy Framework http://www.cit.cornell.edu/oit/policy/frame work-chart.html

8 Security of Information Technology Resources Every user responsible for security of devices connected to the network Five Categories of Users/Obligations IT Director: coordinate security program Unit Heads: oversee (for their unit) Security Liaisons: effectuate (unit risk assessment) Local Support Provider: implement (desktop) User: know who you are and don’t share password!

9 Responsible Use of IT Resources Every user must manage the data on their IT devices Five Categories of Users/Obligations IT Data Director: coordinate Stewards: oversee (policy) Data Liaisons: effectuate (inventory/flows) Custodians: implement (secure that web page!) Users: know who you are (and don’t infringe copyright!)

10 Conclusion Protection, preservation and appropriate use of institutional IT assets and interests requires comprehensive information data and security programs. That an institution have such programs is a given; how they are constructed goes to the history, culture and tradition of the institution.


Download ppt "Management of Data as Responsible Use ICPL 2005. Information Privacy and Security As usual in higher education, different institution will have, and take,"

Similar presentations


Ads by Google