Educause Security Discussion mailing list archives

Re: Security Policy


From: Jenny Blaine <blain004 () UMN EDU>
Date: Fri, 15 Jan 2016 09:47:36 -0600

Hi, David,

Our policies are at
http://it.umn.edu/enterprise-standards/information-security-standards

Quick answers:

1. Yes (just finished up last year).

2. Separate, but related. Acceptable use is at http://z.umn.edu/use

3. Yes.

4. Yes, reviewed but not necessarily because of potential legal action.

5. See link above.

Hope this helps! Good luck!

Jenny Blaine
Security Analyst
University of Minnesota

On Fri, Jan 15, 2016 at 8:39 AM, David Santos <SantosD () felician edu> wrote:

Hi Everyone,



I am in process of developing an IT security policy for our University and
I have a few questions below.



1.       Do your Universities have a security policy?

2.       Is it part of the computer acceptable usage policy or separate?

3.       Does it target complete University community (Faculty, Staff,
and Students)?

4.       Did legal counsel review policy because of possible legal action
taken against persons who are in violation of such policy?

5.       Would it be possible to share some policies with me?



Thanks in advance for any information.



Have a Great Day



David Santos

IT Security & Helpdesk Manager,

Information Technology





Felician University

262 South Main Street

Lodi, NJ 07644

P: 201-559-6075

www.felician.edu



______________________________________________________________________
This outgoing email has been scanned by the MessageLabs Email Security
System for Felician University.
_____________________________________________________________________




-- 
Jenny C. Blaine
Security Analyst
University of Minnesota - University Information Security
jenny () umn edu - 612.625.8807 (office) - 612.978.7215 (mobile)
GSEC GCIH GCFE

CONFIDENTIALITY NOTICE:  This e-mail, including attachments, may
include confidential information, and may be used only by the
person(s) to whom it is addressed or intended. Be aware that the use
of any information within may be restricted by privacy laws.  If the
reader of this e-mail is not the intended recipient, the reader is
hereby notified that any distribution or copying of this e-mail is
prohibited. If you have received this e-mail in error, please notify
the sender by replying to this message and delete this e-mail
immediately.


Current thread: