The IT policy forums help ensure widespread engagement on IT policy development.
On this page: Upcoming Forums | Forum Invitations | Index of forums by topic | Chronological index
Upcoming Forums:
Date, time, location |
Early February 2020 (tentative, date, time, location TBD) |
Late April 2020 (tentative, date, time, location TBD) |
Early August 2020 (tentative, date, time, location TBD) |
Early November 2020 (tentative, date, time, location TBD) |
Previous Forums:
Quarter | FY 07/08 | FY 08/09 | FY 09/10 | FY 10/11 | FY 11/12 | FY 12/13 | FY 13/14 | FY 14/15 | FY 15/16 | FY 16/17 | FY 17/18 | FY 18/19 | FY 19/20 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Summer | None | 2012-08 | 2013-08 | 2014-08 | 2015-08 | 2016-08 | None | 2018-08 | 2019-08 | ||||
Fall | 2012-10 | 2013-11 | None | None | 2016-11 | 2017-10 | 2018-11 | None | |||||
Winter | 2013-02 | 2014-02 | None | None | 2017-02 | 2018-02 | 2019-02 | ||||||
Spring | 2013-05 | 2014-04 | 2015-04 | 2016-04 | None | 2018-04 | 2019-04 |
Forum Invitations
If you would like to receive invitations to the IT policy forums, please send an email to join-itpolicyforums@lists.wisc.edu. This is list is used only for forum invitations.
The monlthy policy announcement digest includes opportunities to help shape IT policy, new and revised documents, policy teams, and policy-related IT governance activity. To join, send a blank email to join-itpolicy-announce@lists.wisc.edu.
Index of IT Policy Forum Discussion Topics
- Accessibility, Web & Mobile
See: Digital Accessibility. - Awareness, of IT Policy
2014-04 (IT Policy) - BYOD, i.e. Use of non-UW-Madison-owned devices
was called POD in 2009 thru 2011, and BYODandCloud in 2013+)
2016-04, 2014-02, 2013-05, 2011-08, 2009-08.
See also: Cloud Computing. - Cloud Computing / Cloud Strategy i.e. Use of non-UW-Madison operated services
(was called POD in 2009 thru 2011, nUWGuidance in 2009-2014, BYODandCloud in 2013 thru 2017, and Cloud Strategy in 2018+)
2018-08, 2016-04, 2014-08, 2014-02, 2013-11, 2013-02, 2011-08, 2011-04, 2018-08.
See also: BYOD. - Communications and Implementation, of Policy (PAT)
2018-02 (in general), 2010-04 (in general), 2014-04 (awareness).
See also: IT Policy Process. - Continuous Diagnostics and Mitigation
2017-02 (as part of the Risk Management Framework), 2017-10 (policy), 2019-02 (implementation at UW-Madison) - Cybersecurity
See: IT Security - Data Discovery
See: Restricted Data - Data Governance
2015-04
See also: Information Resource Management. - Digital Accessibility
2013-11, 2013-08, 2015-08, 2018-04 - Electronic Records Management
2013-02 (records in the cloud), 2012-02 (email as a record).
See also: Information Resource Management. - Encryption
See: Storage, Transmission and Encryption of Sensitive Data. - Endpoint Management
2019-08 - Enterprise IT Decision-Making
2015-04
See also: IT Pre-purchasing Process, Information Resource Management. - Identity Management (IdM) a.k.a. Identity and Access Management (IAM)
2018-11, 2016-08, 2010-11, 2010-04, 2009-11.
See also: Use of Institutional Access Control Services. - Information Incident Reporting (IReport)
2012-05, 2008-08, 2008-02. - Intellectual Property
See: Cloud Computing. - IT Asset Inventory Management
2019-04 - IT Governance
See: Electronic Records Management; Information Resource Management; Intellectual Property; IT Pre-purchasing Process; Security; Web Accessibility; Enterprise IT Decision-making
See also: IT Management and Governance Review (on it.wisc.edu). - IT Policy Plan
2012-02, 2010-04, 2009-04, 2008-02, 2007-11, 2007-08.
- IT Policy Process
2017-10, 2010-04, 2008-04, 2007-11, 2007-08.
For the current process see: IT Policy Principles and Procedures. - Project Intake and Prioritization
(was called IT Pre-purchasing Process until 2012, Enterprise IT Decision-making 2013-2015, and Project Intake and Prioritization since 2016)
2010-04.
See also: Information Resource Management, Enterprise IT Decision-making IT Professionals: Guidelines
2016-11.IT Security
2015-04, 2017-02 (and many more, listed under specific topics)
See also: BYOD; Cloud Computing; Information Incident Reporting; Protection of Archived Data;
Restricted Data; Storage, Transmission and Encryption of Sensitive Data; Web Application Security; Mobile Devices- Personally Owned Devices
See: BYOD. See also: Cloud Computing. - Portfolio Management
See: Project Intake and Prioritization. - Protection of Archived Data (CIA)
2008-02.
See also: IT Security - Protection of Sensitive Data
See: Storage, Transmission and Encryption of Sensitive Data; Information Incident Reporting; Restricted Data - Restricted Data
2014-08.
See also: Storage, Transmission and Encryption of Sensitive Data; Information Incident Reporting. - RIsk Executive, Risk Management, Risk Management Framework
2017-02
See also: IT Security - Security Education Training and Awareness
2018-02 - Sensitive Data
See: Storage, Transmission and Encryption of Sensitive Data; Information Incident Reporting; Restricted Data - Shared [Software] Licensing Management (SLiM)
2011-11, 2009-02, 2008-02. - Storage, Transmission and Encryption of Sensitive Data (IEncrypt) See also: ITransmit, and EncrypTF
2013-11, 2012-08, 2012-02, 2011-02, 2008-11, 2008-02. - Use of Institutional Access Control Services (IAccess)
2008-08.
See also: Identity Management. - UW-Madison Portal Principles
2010-02. - Web Accessibility
See: Digital Accessibility - Web Application Security
2012-10.
Chronological List of IT Policy Forum Discussion Topics and Results
2019-11: No forum
2019-02: Continuous Diagnostics and Mitigation
2018-04: Digital Accessibility Policy Implementation
– Communications Channels
– Finding IT Policies
– Security Education, Training, and Awareness (SETA)
2017-10: Continuous Diagnostics and Mitigation Policy
2017-04: No forum.
2017-02: Cybersecurity Risk Management: The Risk Executive.
2016-11: Being an IT Professional at UW-Madison: Guidelines, Best Practices, and Advice. (Notes to follow up team - – not yet formed at time of forum.)
2016-08: Vision and goals for strong authentication credentials. (Notes to UW-MIST, DoIT Middleware).
2016-04: Non-UW-Madison Devices and Services Recommendations - Next Steps. (Notes to CIO initiative for Personal Devices and Cloud Services.)
2016-02: No forum.
2015-11: No forum.
2015-08:
– Web accessibility policy discussion results. (Notes to Web Accessibility Coordinating Group).
– Web development and publishing process discussion results. (Notes to Web Accessibility Coordinating Group).
2015-04: There was large group Q&A after each presentation:
– Data Goverance
– IT Security
– Portfolio Management
– CIO Office
2015-02: No forum.
2014-11: No forum.
2014-08: Forum disussion results. (Notes to Data Discovery project)
2014-04: Discussion Results 2014-04 – IT policy awareness. (Notes to PPT). Top items from each group
2014-02: Discussion Results 2014-02 – BYOD and Cloud Computing. (Notes to BYODandCloud – not yet formed at time of forum). See also POD.
2013-11: There was large group Q&A on:
– Encryption Futures Task Force Recommendations (EncrypTF members were present), see also IEncrypt and ITransmit.
– Guidelines for Use of non-UW-Madison Applications and Services, a.k.a. Cloud Computing (future BYODandCloud members were present).
– Web Accessibility Policy ( ITAccessCG members were present), see also: ITAccessibility.
2013-08: Discussion Results 2013-08 – Web Accessibility. (Notes to Web Accessibility Coordinating Group). See also: ITAccessibility.
2013-05: Discussion Results 2013-04 – Bring Your Own Device. (Notes to BYODandCloud – not yet formed at time of forum). See also POD.
2013-02: Discussion Results 2013-02 – Electronic Records Management, records in the cloud, and legal issues. (Notes to BYODandCloud – not yet formed at time of forum.)
2012-10: Discussion Results 2012-10 – Web Application Security. (Notes to WebAppS – this team never formed – lost key staff and are rebuilding.)
2012-08: Discussion Results 2012-08 – Storage, Transmission and Encryption of Sensitive Information. (Notes to ITransmit team). See also: Report back (flipchart notes), and IEncrypt.
2012-05: Discussion Results 2012-05 – Information Incident Reporting and Response. (Notes to UW-MIST). See also: IReport
2012-02: Includes –
Discussion Results 2012-02 – Electronic Records Management, email as a record (notes to UW-Madison Records Officer)
Discussion Results 2012-02 Top 3 Issues – IT Policy Plan. (Notes to PPT). See also: .
2011-11: Discussion Results 2011-11 – Shared Software Licensing Management. (Notes to SLiM). See also: Report back (flip chart notes) from all groups.
2011-08: Discussion Results 2011-08 – Personally Owned Devices. (Notes to POD team). Includes Cloud Computing as well. See also nUWGuidance. (Notes to BYODandCloud team– not yet formed at time of forum.)
2011-04: Discussion Results 2011-04 – Cloud Computing. (Notes to POD). See also: , nUWGuidance. (Notes to BYODandCloud – not yet formed at that time)
2011-02: There was a large group discussion on Protection of Sensitive Information Duing Transmission (discussion lead to formation of ITransmit team). Consensus was to work on guidelines, awareness and education. See also: IEncrypt. (Notes to ITransmit – not yet formed at time of forum.)
2010-11: Discussion Results 2010-11 – Identity Management. (Notes to DoIT EIS with key EIS staff present at forum). There was quite bit of Q&A after each presentation. Participants were asked to record their thoughts on IdM-related policy issues on the evaluation forms (evaluation notes to DoIT EIS.)
2010-08: No forum.
2010-04: Discussion Results 2010-04 Flip Chart Summary – A summary of:
Discussion Results 2010-04 Com – Communications and Implementation. (Notes to PPT).
Discussion Results 2010-04 IdM – Identity Management. (Notes to DoIT EIS).
Discussion Results 2010-04 IRM – Information Resource Management. (Notes to IRM – team never formed – was replaced eventually by Enterprise IT Decision Making, which was later replaced by IT Management and Governance Review.)
Discussion Results 2010-04 PreP – IT Prepurchasing Process. (Notes to PreP – team never formed – was replaced eventually by Enterprise IT Decision Making, which was later replaced by IT Management and Governance Review.)
See also: IT Policy Plan 2010-2011.
2010-02: Discussion Results 2010-02 – UW-Madison Portal Principles. (Notes to the portal team).
2009-11: Discussion Results 2009-11 – Identify Management. (Notes to DoIT EIS).
2009-08: Discussion Results 2009-08 – Personally Owned Devices. (Notes to POD).
2009-04: Discussion Results 2009-04 – IT Policy Plan. (Notes to PPT). See also: IT Policy Plan FY 2009-2010.
2009-02: Discussion Results 2009-02 – Shared [Software] Licensing Management. (Notes to SLiM team).
2008-11: Discussion Results 2008-11 – Storage and Encryption of Sensitive Information. (Notes to IEncrypt team).
2008-08: Includes –
Discussion Results 2008-08 on IAccess – Use of Insitutional Access Control Services. (Notes to IAccess initiative).
Discussion Results 2008-08 on IReport – Information Incident Reporting. (Notes to IReport team).
2008-04: Discussion Results 2008-04 – IT Policy Process. (Notes to PPT).
2008-02: Discussion Results 2008-02 – Includes:
Information Incident Reporting. (Notes to IReport team).
Protection of Archived Data. (Notes to OCIS, PPT).
Shared [Software] License Management. (Notes to SLiM team).
Storage and Encryption of Sensitive Information. (Notes to IEncrypt team).
See also: IT Policy Plan multi-voting 2008-02 and the resulting .
plus Policy Planning Team activity leading to the original process and plan. (Notes to PPT).
2007-11: Discussion Results 2007-11 – Includes:
IT Policy Process. IT Policy Plan. (Notes to PPT).
2007-08: Discussion Results 2007-08 – Includes:
IT Policy Process. IT Policy Plan. (Notes to PPT).