Information Technology Policy Institutional Data Policy

Slides:



Advertisements
Similar presentations
Presentation by Cambodian Participants Phuket, Thailand February 2012 Health Impact Assessment Royal Government of Cambodia.
Advertisements

Internal Audit Awareness
The University of Houston Institutional Compliance Program Rev July 2011.
This is an audio presentation Compliance Program Training for First Tier, Downstream and Related Entities.
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
1 Brown Bag Luncheon: ARMICS Update Presented By: Steve Kimata and Susan Herod July 23, 2008.
Information Technology Audit
Peer Information Security Policies: A Sampling Summer 2015.
Audit Committees: practices in the EU Manfred van Kesteren Bucharest, December 4th 2014.
FLEX Day Presentation August 13, Planning and Budgeting Integration Model (PBIM)
APPROVED JULY 2014 GACAG Overview APPROVED JULY 2014 Role of GACAG GACAG Overview Priorities and position statements GACAG Priorities GACAG's.
Progress Report to the PSC Steering Committee INTOSAI PSC Subcommittee on Internal Control Standards SAI of Poland (NIK) June 2011, Wellington.
Establishing A Compliance Program: It Makes Sense
OPERATIONAL PROGRAMME “DEVELOPMENT OF THE COMPETITIVENESS OF THE BULGARIAN ECONOMY” Republic of Bulgaria Ministry of Economy and Energy April 2006.
Organization, Roles and Responsibilities of the National CIO Office Karen S. Evans Administrator, Office of E-Government and Information Technology United.
Copyright © 2014 by The University of Kansas Writing Bylaws.
Project Kick-off Meeting Presented By: > > > > Office of the Chief Information Officer.
Office of Academic Affairs and Student Success Katie High, Interim Vice President India Lane, Assistant Vice President
IBM State and Local Government Team Strategic Vision to Transform Government in Arizona – December 20, Presentation to Society for Information Management.
New Frameworks for Strategic Enrollment Management Planning
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
The Evolution, Development & Training of HIPAA Policies and Procedures in a Decentralized Health Care Environment Presented By: Sharon A. Budman, M.S.
1 PARCC Data Privacy & Security Policy December 2013.
DAY 1: OVERVIEW The nature of internal auditing
Writing Bylaws. Bylaws are written rules that control the internal affairs of an organization.
Valiants Verify Compliance Program Judith W. Spain, J.D., CCEP ® Chief Ethics and Compliance Officer General Counsel (Effective March 2016) 1.
Developing an Audit Program By Rodney Kocot President Systems Control and Security Incorporated Copyright © 2005 Rodney Kocot.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Data Management Scope and Strategies K.L. Sender and J.L. Pappas Information and Technical Services National Marine Fisheries Service Southwest Fisheries.
Seminar for Certified Secretaries Working in State Corporations and County Governments Imperial Hotel Kisumu 13 – 15 April 2016 Session Facilitator: CS.
Guidance Development Merton V. Smith, Ph.D., J.D. Director International Programs and Product Standards Center for Veterinary Medicine, FDA.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Moving Towards Information Literacy Through Data Governance
Project Kick-Off Meeting
Information Security Program
IT Audit Processes and Audit
Data UW-Madison February, 2017.
SACSCOC Fifth-Year Readiness Audit
Overview of the Information Security Guide: Leveraging the Knowledge and Skills of Your Colleagues Cedric Bennett, Emeritus Director, Information Security.
A Sampling of IT Compliance in Higher Education – 2010
Lincolnshire Community and Voluntary Service
Orlando Leon • Cynthia Herrera Lindstrom • Joanna Lyn Grama
University IT Strategy
Developing a Data Risk Classification Program
CISM Dumps PDF Latest Certified Information Security Manager CISM dumpsCISM dumps pdfCISM braindumpsCISM exam dumps.
IT Development Initiative: Status and Next Steps
THREE-YEAR LOCAL STRATEGIC PLANNING
Using Federal Compliance for Institutional Learning and Improvement
Foothill College Accreditation Self-Study Update
Improving the First Year: Campus Discussion March 30, 2009
Enterprise Risk Management
IS4550 Security Policies and Implementation
Who we are…. Sponsored Programs and University Initiatives Grant Writing Workshop 6/6/18.
Presented by: Corinna Evett
UNLV Data Governance Executive Sponsors Meeting
Enterprise Risk Management (ERM) at Clayton State University
Director and Chief of Police
Principle 2: CEO Oversight
Colorado state university-pueblo policy and administration (PA)
Executive Committee Meeting May 18, 2018
Board of Regents Policies Administrative Policies
Academic Experience Survey 2015
Eurostat A short introduction
Presentation to the Portfolio Committee - Labour
Taking the STANDARDS Seriously
MOF Update Community Design
Administrative Policy Development Process Doc # , Approved by Division Directors on , Updated , , Administrative Policy Committee.
Office of Audit, Compliance & Privacy
Presentation transcript:

Information Technology Policy Institutional Data Policy Bob Kalal Director, Information Technology Policy and Services Office of the Chief Information Officer

Information Technology Policies Support the university's missions Educate the community Promote university-wide efficiencies Reduce institutional risk Help ensure compliance with laws and regulations Are often implicit in strategic plans, official statements and actions, other rules and policies.

Ohio State Policy Development Process Formal information technology policies are developed and implemented through a broadly-based campus process managed by the Office of the CIO: Draft and development group Input from campus community Input from higher education community Input from industry and government sources Public comment period Final policies are approved by the Office of Academic Affairs and the President’s Cabinet A task group monitors policy implementation and ongoing issues

Institutional Data Policy Enterprise Data Steering Committee Classification and Stewardship Roles and Responsibilities Security and Privacy Data Policy Roadmap

Comments and Information: email: ITPolicy@osu.edu