Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, 2003. This work is the intellectual property of the authors. Permission is granted.

Slides:



Advertisements
Similar presentations
What Does the Net Generation Expect From Us? SAC August 8, 2005 SAC August 8, 2005 Copyright © 2005, Joel L. Hartman. This work is the intellectual property.
Advertisements

Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
Linda Ricks Managing Director, Information Systems May 25, 2006 Project and Resource Portfolio Management.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Andrea Eastman-Mullins Information & Technology Coordinator University of North Carolina, Office of the President Teaching and Learning with Technology.
Copyright statement Copyright David Consiglio, Pattie Orr, and Andrew White, This work is the intellectual property of the authors. Permission is.
Advancing Security Programs through Partnerships Cathy HubbsShirley Payne IT Security Coordinator Director for Security Coordination & Policy George Mason.
The Pieces and the Puzzle of IT Policy University Computer Policy and Law Program April 7, 2004.
Pam Downs Ajay Gupta The Pennsylvania Prince George’s State University Community College "Copyright Penn State University This work is the intellectual.
1 IT Security-related Legislation Judy Borreson Caruso CUMREC 2004 May 18, 2004 Copyright Judy Borreson Caruso, This work is the intellectual property.
NLII Mapping the Learning Space New Orleans, LA Colleen Carmean NLII Fellow Information Technology Director, ASU West Editor, MERLOT Faculty Development.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
INDIANAUNIVERSITYINDIANAUNIVERSITY Automated Network Isolation at Indiana University David A. Greenberg Information Technology Security and Policy Office.
Web Portal Development with uPortal or.Net Midwest Educause: March 24-26, 2003 David B. Williams Mark Troester
Unraveling Web Development PRESENTERS: Bob Nakles and Paras Kaul, George Mason University.
Copyright Shanna Smith & Tom Bohman (2003). This work is the intellectual property of the authors. Permission is granted for this material to be shared.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Security Awareness: Taking the Medicine and Liking It Shirley C. Payne Director for Security Coordination University of Virginia EDUCAUSE Conference October.
Developing Online Degree Programs using a Collaborative Approach with Industry Experts as SMEs Copyright: Terry Norris This work is the intellectual.
Copyright - L. Thanasides, 2002 Using the Right FACTS Can Be Informative: Florida’s Statewide Student Information System Linda Thanasides Marsha Stickel.
1 Outsourcing Student & Other Collaboration Services Wendy Woodward Director, Technology Support Services Copyright Wendy Woodward This work.
Classroom Technologies Re-organization Copyright Kathy Bohnstedt, This work is the intellectual property of the author. Permission is granted for.
Creating A More Educated Georgia Plagiarism Detection: Is Technology the Answer? USG Surveys Liz Johnson Project Manager Advanced Learning Technologies.
Best Practices For Using Technology To Deliver Instructional Support Services Dr. Steven G. Sachs Northern Virginia Community College Copyright Steven.
Page 1 Copyright Jill M. Forrester This work is the intellectual property of the author. Permission is granted for this material to be shared for.
Herding CATS: the Community of Academic Technology Staff Lou Zweier, Director CSU Center for Distributed Learning The California State University NLII,
Sharing Information and Controlling Content: Continuing Challenges for Higher Education Susanna Frederick Fischer Assistant Professor Columbus School of.
Catalyst Portfolio Tool Copyright Tom Lewis, This work is the intellectual property.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Ten Thing IT Staff Need to Know About Education Records Privacy Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith.
HumaniTech®: Educause, Seattle October 24, 2007 Bridging Divides, Building Collaborations
The Scales of Justice Balancing Policy and Law Against Expectations in Real-Life Computer Abuse Cases.
Building the Integrated Learning Center Having the right people at the table Chris Johnson, Senior Consultant for Learning Technologies University of Arizona.
Issues Associated with ePortfolios in Small Colleges EDUCAUSE Mid-Atlantic Regional Conference 2006 Ed Barboni, Senior Advisor, Council of Independent.
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Title: Developing a Multimedia Tutorial Style Guide to Expand Student Training Author: Suzie Medders, Student Training Coordinator Educational Technology.
NERCOMP 2002 Ten Things IT Staff Need to Know About Education Records Privacy Jeff von Munkwitz-Smith University Registrar University of Connecticut.
NERCOMP 2002 Networks, Town and Gown: Collaborating with the Community Pat Cronin & Bill Davis Bridgewater State College Bridgewater, Massachusetts Copyright.
Copyright John D. Hoh 2003 This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Copyright Copyright University of Washington This work is the intellectual property of the author. Permission is granted for this material to be.
Grids USC Case Study Copyright Shelley Henderson This work is the intellectual property of the author. Permission is granted for this material to.
Rethinking Campus and Classroom Design William J. Mitchell NLII 2004 September 9, 2004 Copyright William Mitchell, This work is the intellectual.
George Mason University Assessing Technology Support: Using Portfolios to Set Goals and Measure Progress Anne Agee, Star Muir, Walt Sevon Information Technology.
Copyright © 2003, The University of Texas at Austin. This work is the intellectual property of the author. Permission is granted for this material to be.
University and IT Policies: Match or Mis-match? Marilu Goodyear, Vice Provost for Information Services and CIO Jenny Mehmedovic, Coordinator of IT Policy.
Copyright David A. Cox This work is the intellectual property of the author. Permission is granted for this material to be shared for non- commercial,
Integration is Critical for Success Curriculum Course Delivery Ongoing Support Instructor & Learner.
A Cat-Herding Tale Forging a Single Course Management System for a Decentralized Institution Copyright Abdul Shibli, 2004.This work is the intellectual.
1 Effective Incident Response Presented by Greg Hedrick, Manager of Security Services Copyright Purdue University This work is the intellectual property.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
2007 Carnegie Mellon University 1 Copyright Kelley Anderson and Mary L. Pretz- Lawson, This work is the intellectual property of the authors. Permission.
Copyright © 2011 Rachel Fourny. This work is the intellectual property of Rachel Fourny. Permission is granted for this material to be shared for non-commercial,
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
The Duluth Area CIO’s Consortium Collaborating with Regional IT Organizations Copyright Linda Deneen and Lynne Hamre, This work is the intellectual.
Copyright James Kulich This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Chief Information Officer Effectiveness in Higher Education Wayne Brown, Ph.D. Copyright Wayne Brown This work is the intellectual property of the.
Copyright Michael White and Sylvia Maxwell, This work is the intellectual property of the author. Permission is granted for this material to be shared.
© Scottsdale Community College Leveraging the Power of E-Learning Taking your course to a higher level Presented by Sidne Tate Director, Instructional.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
October 2006 Funded by JISC and ESRC to serve the UK academic and research communities. Voyage of the U.K. JISC Federation: Shibbolizing the U.K.'s Research,
Jill Forrester and David Kelly| October 20, 2011
Julian Hooker Assistant Managing Director Educause Southwest
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Ed Barboni, Senior Advisor, Council of Independent Colleges
Project for OnLine Instructional Support (POLIS)
myIS.neu.edu – presentation screen shots accompany:
An App A Day Copyright Tina Oestreich and Brian Yuhnke This work is the intellectual property of the author. Permission is granted for this material.
EDUCAUSE Networking 2002 Washington, D.C. April 17, 2002
Crafting Broadband and Spectrum Policy To Serve the “Public Good”
Presentation transcript:

Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the authors.

Tales from the Trenches Cynthia Golden, (Convener) H. Morrow Long –Director Information Security Office, Yale Timothy J. McGovern –StopIT! Coordinator, MIT Patti Orr –Director of User Services, Wellesley Tracy Mitrano (Moderator) –Policy Advisor, Cornell

ISSUES: Yale How does IT respond when another institution has used proprietary information that they possess to access an application on your servers? – Is it illegal? –Is it against policy? –Where do the liabilities lie? –How to remediate: With whom/offices to coordinate on campus? IT security? Media? Institutional reputation? Relations with (rival?) institution?

Issues: MIT What do you do when a potential criminal activity and/or investigation has an IT component? –When reasonable cause for law or policy violation? –Where does IT service begin and forensics end? Internal training/certification/capabilities of staff Permission of supervisors Relations with law enforcement –With whom do you consult? Supervisor/VP of IT Counsel VPs for students (who does the communication?) Staff, confidentiality about investigation, e.g.

Issues: Wellesley How does IT become involved in the health and safety of one of the members of the campus community? –Trust source information Generated from within IT or outside? Is it really health and safety or a quasi-criminal investigation? –Permissions required to access IT resources Constituent’s VP or Provost Your own supervisor Chain of command and chain of custody Confidentiality and Public Relations –How to plan for such eventualities in advance?

Law, Policy and Coordination Template Law Family Education Rights Privacy Act Computer Fraud and Abuse Mass. General Law on Animal Cruelty Policy Privacy, Responsible Use, Security, Campus Code Coordination Counsel, Judicial Administration, Admissions, Campus Police, Student Affairs, Vice Presidents/Provost of Students/Faculty/Staff, Public Affairs, SPCA(!)

For More Information: EDUCAUSE/Cornell Institute for Computer Policy and Law –Web Site/Policy Library – EDUCAUSE/Cornell Institute for Computer Policy and Law Summer Program –