Educause Security Discussion mailing list archives

Re: FW: process for creating Information security policies and guidelines


From: James Farr '05 <jfarr () UTICA EDU>
Date: Mon, 12 Sep 2011 10:05:31 -0400

I bet this will be popular.  I would also like to see this information.

 

James Farr

Information Security Officer

Instructional Technologist

Utica College

jfarr () utica edu

315-223-2386

 

 

 

From: The EDUCAUSE Security Constituent Group Listserv
[mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Barrett, Bruce R.
Sent: Sunday, September 11, 2011 9:24 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: Re: [SECURITY] FW: process for creating Information security
policies and guidelines

 

Ditto. Pleae...please...please

 

Regards,

Bruce

 

  _____  

From: The EDUCAUSE Security Constituent Group Listserv
[SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Mohamed Elhindi
[melhindi () UWLAX EDU]
Sent: Sunday, September 11, 2011 9:05 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] FW: process for creating Information security policies
and guidelines

 

Hello

We are in the process of reviewing our information security policy.  We are
looking for a process that other universities have used to create university
information security policies and guidelines.  If possible, would you please
share your flowchart and procedures used for creating information security
policies and guidelines? 

Thank you in advance for your help. 

 

 

Mohamed A. Elhindi, PhD

Assistant Vice Chancellor- Chief Information Officer 

University of  Wisconsin-La Crosse

1725 State street

La Crosse, WI 54601, USA

Phone:  608-785-8662|  Fax: 608-785-8306

 

Please note the University will NEVER ask you to send your password via an
email message. If you received these kind of messages please delete it
immediately without any reply.

 


Current thread: