19
Eight Schools Information Security Policies: The Process at Hotchkiss

Eight Schools Information Security Policies: The Process at Hotchkiss

  • Upload
    aurek

  • View
    26

  • Download
    1

Embed Size (px)

DESCRIPTION

Eight Schools Information Security Policies: The Process at Hotchkiss. Information Security…. …not an entirely new idea. Hotchkiss Strategic Technology Plan. Developed May 2007 through February 2008 by a twenty-member broad-based committee - PowerPoint PPT Presentation

Citation preview

Page 1: Eight Schools Information Security Policies: The Process at Hotchkiss

Eight Schools Information Security Policies:

The Process at Hotchkiss

Page 2: Eight Schools Information Security Policies: The Process at Hotchkiss

Information Security…

Page 3: Eight Schools Information Security Policies: The Process at Hotchkiss

…not an entirely new idea.

Page 4: Eight Schools Information Security Policies: The Process at Hotchkiss

Hotchkiss Strategic Technology Plan

Developed May 2007 through February 2008 by a twenty-member broad-based committee

Comprehensive plan covers academic and administrative technologies

Page 5: Eight Schools Information Security Policies: The Process at Hotchkiss

Hotchkiss Strategic Technology Plan

Resulted in action-oriented goals and detailed action plans

After adoption, a workgroup was assigned to begin work on administrative objectives

Page 6: Eight Schools Information Security Policies: The Process at Hotchkiss

Progression of Work

Strategic Technology Plan

Administrative Technology

Educational/Instructional Technologies

Administrative Technology Workgroup

Information Security Policy

Project

Page 7: Eight Schools Information Security Policies: The Process at Hotchkiss

Administrative Technology Workgroup

Surveyed all departments

Identified systems that process data

Created comprehensive systems list

Diagrammed system and data overviews

Once background work was completed, workgroup evolved into Data Committee

Committee work began before the Eight Schools initiative, but helped to identify

information security needs and to inform the process for Hotchkiss

Page 8: Eight Schools Information Security Policies: The Process at Hotchkiss
Page 9: Eight Schools Information Security Policies: The Process at Hotchkiss
Page 10: Eight Schools Information Security Policies: The Process at Hotchkiss
Page 11: Eight Schools Information Security Policies: The Process at Hotchkiss

Application List

Page 12: Eight Schools Information Security Policies: The Process at Hotchkiss

Responsibilities for Information Security Project

There is no dedicated information security officer

Information Technology Governance CouncilSchool leaders and IT Director

General IT governance and strategic oversight

Information Security Steering CommitteeCFO, Dean of Faculty, HR Director, IT Operations

Manager, IT Director

Provides oversight for this process

Page 13: Eight Schools Information Security Policies: The Process at Hotchkiss

ResponsibilitiesData Committee

Moving forward with recommendations from Administrative Technology Workgroup

Oversee identification and classification of data

Key role in rollout of information security policies

HR Director and Dean of Faculty

Communicate and enforce policies with Staff and Faculty

IT Department

Implementation of technology solutions

Page 14: Eight Schools Information Security Policies: The Process at Hotchkiss

ProcessKick-off call with Information Security

Steering CommitteeFishNet overview

Review charter

Discuss site visit and responsibilities

Charter reviewSteering committee

Key members of ITS and other departments

Page 15: Eight Schools Information Security Policies: The Process at Hotchkiss

ProcessGathered and shared existing policies

and documentation

FishNet site visitInformation gathering and discussion of the

processMet with several groups of stakeholders

Alumni and Development Information Technology Health Services Business Office Data Committee

AdmissionsHuman ResourcesCommunicationsSecurityDeans

Page 16: Eight Schools Information Security Policies: The Process at Hotchkiss

Process

FishNet creates draft policies, solicits feedback per schedule

IT Director shares preliminary policies among groups as appropriate and seeks feedback

Feedback communicated via Eight Schools SharePoint Site and weekly status calls

Page 17: Eight Schools Information Security Policies: The Process at Hotchkiss

Implementation

IT will address technical aspects, but this is more than an IT initiative

CFO will address Business Office requirements

Human Resources will address components, and communicate policies to Staff

Dean of Faculty will address components and communicate policies to Faculty

Page 18: Eight Schools Information Security Policies: The Process at Hotchkiss

Some ChallengesEnlisting Involvement outside of IT – “It’s an

IT issue.”

Consistency of Eight School policies with existing Hotchkiss policies (Red Flag, AUP, etc.)

Differing timelines and priorities among Eight Schools

Information overload and implementation concerns

Large number of drafts to review (charter, policies)

Sixteen policies to implement; some may already exist, many do not

Page 19: Eight Schools Information Security Policies: The Process at Hotchkiss

Summary

Technology Planning process was critical for Hotchkiss

Responsibilities are distributed

Implementation may be intimidating, but will be achieved methodically

Consortium work added tremendous value to policy development process

There are challenges, but the process is valuable and the

policies are essential