Educause Security Discussion mailing list archives

Re: IT security policies and procedures


From: Peter Setlak <psetlak () COLGATE EDU>
Date: Fri, 21 Mar 2014 11:25:48 -0400

We just recently finished a policy for stewardship of email - outlining the
process we go through to access accounts and to prevent abuse of such
privileges. We are also in the process of updating policies (such as data
classification and logging) which will be posted here (
http://www.colgate.edu/itsecurity/policy) when completed.


On Fri, Mar 21, 2014 at 11:04 AM, Dan Navarro <dnavarro () umd edu> wrote:

 Hello Educause IT Security colleagues,



Here at the University of Maryland we are in the process of reviewing our
policies on data management/access and IT security in general.  I have an
IT policy from Indiana, but if any of your universities have such policies,
I would certainly appreciate receiving a copy or link.



Thanks in advance.



-Dan



Dan Navarro

Director

Office of Academic Computing Services

A unit of the College of Behavioral and Social Sciences
University of Maryland

dnavarro () umd edu

301-405-1661






-- 
Thank you,

Peter J. Setlak
Network Security Analyst, GSEC, GLEG, GCPM
Colgate University
---
psetlak () colgate edu
(315) 228-7151
Case-Geyer 450

Colgate IT Security - http://colgate.edu/itsecurity

Think *Green!* Please consider the environment before printing this email.


*Engage with Colgate University: *
News blog <http://blogs.colgate.edu/>,
Twitter<https://twitter.com/#%21/colgateuniv>
, Facebook <https://www.facebook.com/colgateuniversity>,
Google+<https://plus.google.com/u/0/b/113333907606560373469/>
, Delicious <http://www.delicious.com/colgatenewsmakers>,
YouTube<http://www.youtube.com/cuatchannel13>
, Flickr <http://www.flickr.com/photos/colgateuniversity/>,
Pinterest<http://pinterest.com/colgateuniv/>
, LinkedIn <http://www.linkedin.com/company/colgate-university/>

Current thread: