Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, 2003. This work is the intellectual property of the authors. Permission is granted.

Similar presentations


Presentation on theme: "Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, 2003. This work is the intellectual property of the authors. Permission is granted."— Presentation transcript:

1 Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, 2003. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the authors.

2 Tales from the Trenches Cynthia Golden, (Convener) H. Morrow Long –Director Information Security Office, Yale Timothy J. McGovern –StopIT! Coordinator, MIT Patti Orr –Director of User Services, Wellesley Tracy Mitrano (Moderator) –Policy Advisor, Cornell

3 ISSUES: Yale How does IT respond when another institution has used proprietary information that they possess to access an application on your servers? – Is it illegal? –Is it against policy? –Where do the liabilities lie? –How to remediate: With whom/offices to coordinate on campus? IT security? Media? Institutional reputation? Relations with (rival?) institution?

4 Issues: MIT What do you do when a potential criminal activity and/or investigation has an IT component? –When reasonable cause for law or policy violation? –Where does IT service begin and forensics end? Internal training/certification/capabilities of staff Permission of supervisors Relations with law enforcement –With whom do you consult? Supervisor/VP of IT Counsel VPs for students (who does the communication?) Staff, confidentiality about investigation, e.g.

5 Issues: Wellesley How does IT become involved in the health and safety of one of the members of the campus community? –Trust source information Generated from within IT or outside? Is it really health and safety or a quasi-criminal investigation? –Permissions required to access IT resources Constituent’s VP or Provost Your own supervisor Chain of command and chain of custody Confidentiality and Public Relations –How to plan for such eventualities in advance?

6 Law, Policy and Coordination Template Law Family Education Rights Privacy Act Computer Fraud and Abuse Mass. General Law on Animal Cruelty Policy Privacy, Responsible Use, Security, Campus Code Coordination Counsel, Judicial Administration, Admissions, Campus Police, Student Affairs, Vice Presidents/Provost of Students/Faculty/Staff, Public Affairs, SPCA(!)

7 For More Information: EDUCAUSE/Cornell Institute for Computer Policy and Law –Web Site/Policy Library –http://www.educause.edu/icpl/http://www.educause.edu/icpl/ EDUCAUSE/Cornell Institute for Computer Policy and Law Summer Program –http://www.sce.cornell.edu/exec/cpl.php


Download ppt "Tales from the Trenches Copyright Long, Mitrano, McGovern, and Orr, 2003. This work is the intellectual property of the authors. Permission is granted."

Similar presentations


Ads by Google