Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Information Technology Awareness Wayne Donald IT Security Officer.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
Transit Security: An Overview of Activities Since 9/11 Eva Lerner-Lam President Palisades Consulting Group, Inc. ITE 2003 Annual Meeting August 24-27,
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
A Model for IT Policy Development Marilu Goodyear & Beth Forrest Warner University of Kansas Educause 2001October 29, 2001.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
Stewardship and Custodianship of Electronic Mail Office of Information Technologies University Computer Policy and Law Program Office of Information Technologies.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Incident Response From the Ground Up Ellen Young and Adam Goldstein Dartmouth College NERCOMP March 11, 2008.
Peer Information Security Policies: A Sampling Summer 2015.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
General Awareness Training
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Leveraging Weatherization Funding The Energy Project March 1, 2012.
Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
THE TEACHING & LEARNING CENTER- AN OVERVIEW MOHAMMED EL-AFFENDI AUGUST 2014.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
The Fifth National HIPAA Summit – October 30, 2002 What to Do Now: Operational Implementation of HIPAA Privacy and Security Training Presented by: Steven.
Safeguarding Research Data Policy and Implementation Challenges Miguel Soldi February 24, 2006 THE UNIVERSITY OF TEXAS SYSTEM.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Educause Live! August 3, USA PATRIOT Act and Beyond: How Higher Education Institutions and Libraries are Cooperating and Coping Marilu Goodyear CIO.
1 The Mental Health Continuum of Care and Related Legal Issues in The State University System of Florida Vikki Shirley Dorothy J. Minear February 26, 2008.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Data Access & New Banner Admin UI Professional Development Session May 11, am Presented by: Management Information Center.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Acceptable Use Policy (Draft)
Promoting Evidence-Based Policymaking by Sharing State Administrative Data Dr. Marty Romitti January 25, 2017.
Data Security and Privacy Overview: NJDOE’s Approach to Cybersecurity
East Carolina University
Providing Access to Your Data: Handling sensitive data
The Vision: Invent a system to increase client success…..the medical clinic model.
Red Flags Rule An Introduction County College of Morris
Higher Education Privacy Update
Contact Center Security Strategies
Networking for Home and Small Businesses – Chapter 8
HIPAA Policy & Procedure Strategies
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
NPHS 1510 Federal and International
Session 1 – Introduction to Information Security
Presentation transcript:

Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004

Office for Computing Policy  Campus IT Security Issues  IT Policy Appropriate Use Privacy and Public Record Accessibility  HIPAA  Copyright Agent

Relation to Teaching and Research The Security Office helps you to  Maintain control of you computer  Protect sensitive or confidential information  Help you satisfy granting agencies increasing requirements for security  Protect student systems as well as faculty and staff systems

Security is Everybody’s Business  Security and privacy are about people more than about technology  IT Security is a community thing In August 2003, a 2.5% infection rate crippled the network.  IT response is to automate prevention as much as possible  BUT – Everyone has a part to play

What are the Technical Threats and Issues Password Security Viruses and Worms SPAM “Foreign” Systems Data Loss Compromised Confidential Data Network Snooping Spyware

New Challenges  A new worm can spread world wide in 10 minutes  August 2003 worm affected more than 75% of student systems and over 2,000 University systems  Increasing Federal regulations  Nervous Granting Agencies

A Few Security Services  Anti Virus Protection for campus and home  Spam Control – pilot project  Training and outreach  7*24 Network Protection  Appropriate Use Enforcement  Emergency Access to Confidential Material  Call 962-HELP for assistance

Policy Development Use existing resources when possible Develop in consultation with  FITAC  IT Directors  Legal  CTC  Relevant committees (e.g. Copyright, HIPAA Steering)  Student Government  Public meetings

Policy Development (Continued) Approval by:  Vice Chancellors  BOT Establish procedures to support policy Publicize

Local Resources

Questions?  Thank You For Your Time and Collaboration