Security Policies for Institutions of Higher Education. Ardoth A. Hassler, Associate VP for University Information Services, Georgetown University Tracy B. Mitrano, Director of IT Policy and Computer Policy and Law Program, Cornell University. Abstract.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Ardoth A. Hassler, Associate VP for University Information Services, Georgetown University
Tracy B. Mitrano, Director of IT Policy and Computer Policy and Law Program, Cornell University
EDUCAUSE/NSF Scan of Higher Education IT/Data Environments, August 2002
Cornell University expects all individuals using information technology devices connected to the network to take appropriate measures to manage the security of those devices.
The university must preserve its information technology resources, comply with applicable laws and regulations, and comply with other university or unit policy regarding protection and preservation of data.
Towards these ends, faculty, staff and students must share in the responsibility of the security of IT devices.
assigns people into four main groups:
Information Service Providers
Both central and local
Managers of Users
Defines role of:
University Information Security Officer
Local Information Security Personnel
Cornell: assigns people into five groups:
IT Security Director
Local Support Provider
UsersInformation Security Policy:Obligations of All Users
All users are responsible for protecting information resources to which they have access