Skip to end of metadata
Go to start of metadata

Previous forum | Next forum

For discussion results, see items C and D below.

IT Policy Forum, Tuesday, February 7th, 2012, 11:30-1:00, Rm 4151 Grainger

Agenda:

A. Introduction
          Bruce Maas, Vice Provost for Information Technology, and UW-Madison CIO 

B. Recommendations for encryption of sensitive information during transmission
    (Executive summary | Full Recommendations)

    1. Adopt a policy that sensitive information be encrypted during transmission
       (add it to the existing encryption policy to cover both storage and transmission)
          Nick Davis, DoIT Security, PKI

    2. Develop and maintain role-based documents for specific audiences
          Jim Leinweber, State Lab or Hygiene

    3. Continue to deploy campus sponsored solutions
          Rick Konopacki, Med School

    4. Build ongoing awareness and training
          Eric White, Survey Center

    Discussion

C. Electronic Communications Guidance for University Records
    (Document | Forum presentation | Full presentation)
       Peg Eusch, Records Management

    Discussion

Discussion results (tick)


D. What are the three most important things we should be working on in IT Policy?
    Please list your top three to the evaluation form. Results to be discussed at the Spring Forum.

       Results (tick)

Next IT Policy Forum: May 1st, 2012, 11:30-1:00, Memorial U. (Check TITU) 

Contact:

Judy Caruso
Director, Policy and Planning
judy.caruso@cio.wisc.edu

Gary De Clute
IT Policy Consultant
gdeclute@cio.wisc.edu

 

https://wiki.doit.wisc.edu/confluence/display/POLICY/Home
http://www.cio.wisc.edu/policies

PPT Members

Member

Unit

 

Member

Unit

 

Member

Unit

Bruno Browning

L&S

 

Peg Eusch

Records Mgt

 

Phil Saunders

EM

Monica Bush

OCIS

 

Laura Grady

CIO Communications

 

Brenda Spychalla

Education

Judy Caruso (chair)

Office of the CIO

 

David Parter

CS

 

Eric Straavaldsen

L&S

Gary De Clute (staff)

Office of the CIO

 

Martha Pelkey

DoIT Security

 

 

 

Executive Summary of IT Policy
Policy Planning Team
IT Policy Plan for AY 2011-2012
IT Policy Initiative Status as of 2012-01
IT Policy Review Schedule as of 2012-01

Attachments:

  File Modified
Microsoft Word Document
IT Policy Forum 2012-02 Top3.docx The three most important things we should be working on in IT Policy
Feb 23, 2012 by GARY W DECLUTE
Microsoft Excel Sheet
Evaluations-2012-02.xls Forum Evaluations (and top three issues in IT policy)
Feb 07, 2012 by GARY W DECLUTE
Microsoft Powerpoint Presentation
Electronic Comm Guidance for Univer… Electronic Communication Guidance, Forum presentation
Feb 07, 2012 by GARY W DECLUTE
PDF File
Feb 06, 2012 by GARY W DECLUTE
Microsoft Powerpoint Presentation
Electronic Comm Guidance for Univer… Electronic Communication Guidance, Full presentation (contains additional slides)
Jan 31, 2012 by GARY W DECLUTE
PDF File
2012 Electronic Communications - Fi… 2012 UW-Madison University Employee Guide to: Electronic Communication Guidance for University Records
Jan 27, 2012 by GARY W DECLUTE
PDF File
ITransmit-Exec-Summary-2011-12-19a.… ITransmit Executive Summary only.
Jan 27, 2012 by GARY W DECLUTE
PDF File
ITransmit_Recommendations-2011-12-1… Recommendations for Protection of Sensitive Information during Transmission (ITransmit). As presented to the CIO on Dec 19. with additional follow up actions added.
Jan 20, 2012 by GARY W DECLUTE

Contact

2 Comments

  1. In document: ITransmit_Recommendations-2011-12-19a.pdf I'm curious why there was no mention of TLS encryption for  email server to server traffic and server to client traffic.

    1. The team recommended that we have 'guidelines for IT staff and power users.' The suggestion is that this be a fairly straightforward list of available technical solutions, from which experts can put together an end-to-end solution that fits their scenario. TLS will be on the list.