Please report any problems to wiki-admin(a)lists.wisc.edu or use our support form. For more info Shared Tools KB
Skip to end of metadata
Go to start of metadata

The IT policy forums help ensure widespread engagement on IT policy development.

On this page: Upcoming Forums | Forum Invitations | Index of forums by topic | Chronological index

Upcoming Forums:

Date, time, location

Early November 2019 (tentative)

Early February 2020 (tentative)

Late April 2020 (tentative)

Previous Forums:

Forum Invitations

If you would like to receive invitations to the IT policy forums, please send an email to join-itpolicyforums@lists.wisc.edu. This is list is used only for forum invitations.

The monlthy policy announcement digest includes opportunities to help shape IT policy, new and revised documents, policy teams, and policy-related IT governance activity. To join, send a blank email to join-itpolicy-announce@lists.wisc.edu.

Index of IT Policy Forum Discussion Topics

  • Accessibility, Web & Mobile
       See: Digital Accessibility.
  • Awareness, of IT Policy
       2014-04 (IT Policy)
  • BYOD, i.e. Use of non-UW-Madison-owned devices
           was called POD in 2009 thru 2011, and BYODandCloud in 2013+)
        2016-04, 2014-02, 2013-05, 2011-082009-08.
       
    See also: Cloud Computing.
  • Cloud Computing / Cloud Strategy i.e. Use of non-UW-Madison operated services
           (was called POD in 2009 thru 2011, nUWGuidance in 2009-2014, BYODandCloud in 2013 thru 2017, and Cloud Strategy in 2018+)
       2018-08, 2016-04, 2014-08, 2014-02, 2013-11, 2013-02, 2011-08, 2011-04, 2018-08.
      
    See also: BYOD.
  • Communications and Implementation, of Policy (PAT)
      2018-02 (in general),  2010-04 (in general), 2014-04 (awareness).
       See also: IT Policy Process.
  • Continuous Diagnostics and Mitigation
       2017-02 (as part of the Risk Management Framework), 2017-10 (policy), 2019-02 (implementation at UW-Madison)
  • Cybersecurity
       See: IT Security
  • Data Discovery
       See: Restricted Data
  • Data Governance
       2015-04
       See also: Information Resource Management.
  • Digital Accessibility
       2013-11, 2013-08, 2015-08, 2018-04
  • Electronic Records Management
      
    2013-02 (records in the cloud), 2012-02 (email as a record).
       See also: Information Resource Management.
  • Encryption
       See: Storage, Transmission and Encryption of Sensitive Data.
  • Endpoint Management
       2019-08
  • Enterprise IT Decision-Making
       2015-04
       See also: IT Pre-purchasing Process, Information Resource Management.
  • Identity Management (IdM) a.k.a. Identity and Access Management (IAM)
       2018-11, 2016-08, 2010-11, 2010-04, 2009-11.
       See also: Use of Institutional Access Control Services.
  • Information Incident Reporting (IReport)
       2012-05, 2008-08, 2008-02.
  • Intellectual Property
       See: Cloud Computing.
  • IT Asset Inventory Management
       2019-04
  • IT Governance
       See: Electronic Records Management; Information Resource Management; Intellectual Property; IT Pre-purchasing Process; Security; Web Accessibility; Enterprise IT Decision-making
       See also:  IT Management and Governance Review (on it.wisc.edu).
  • IT Policy Plan
       2012-02, 2010-04, 2009-04, 2008-02, 2007-11, 2007-08.
  • IT Policy Process
       2017-10, 2010-04, 2008-04, 2007-11, 2007-08.
       For the current process see: IT Policy Principles and Procedures.
  • Project Intake and Prioritization
      
    (was called IT Pre-purchasing Process until 2012, Enterprise IT Decision-making 2013-2015, and Project Intake and Prioritization since 2016)
      
    2010-04.
       See also: Information Resource Management, Enterprise IT Decision-making
  • IT Professionals: Guidelines
      
    2016-11.

  • IT Security
      
    2015-042017-02   (and many more, listed under specific topics)
      
    See also: BYOD; Cloud Computing; Information Incident Reporting; Protection of Archived Data;
          Restricted Data; Storage, Transmission and Encryption of Sensitive Data; Web Application Security; Mobile Devices

  • Personally Owned Devices
       See: BYOD. See also: Cloud Computing.
  • Portfolio Management
       See: Project Intake and Prioritization.
  • Protection of Archived Data (CIA)
       2008-02.
       See also: IT Security
  • Protection of Sensitive Data
       See: Storage, Transmission and Encryption of Sensitive Data; Information Incident Reporting; Restricted Data
  • Restricted Data
       2014-08.
       See also: Storage, Transmission and Encryption of Sensitive Data; Information Incident Reporting.
  • RIsk Executive, Risk Management, Risk Management Framework
      
    2017-02
       See also: IT Security
  • Security Education Training and Awareness
       2018-02
  • Sensitive Data
       See: Storage, Transmission and Encryption of Sensitive Data; Information Incident Reporting; Restricted Data
  • Shared [Software] Licensing Management (SLiM)
       2011-11, 2009-02, 2008-02.
  • Storage, Transmission and Encryption of Sensitive Data (IEncrypt) See also: ITransmit, and EncrypTF
       2013-11, 2012-08, 2012-02, 2011-02, 2008-11, 2008-02.
  • Use of Institutional Access Control Services (IAccess)
       2008-08.
       See also: Identity Management.
  • UW-Madison Portal Principles
       2010-02.
  • Web Accessibility
       See: Digital Accessibility
  • Web Application Security
       2012-10.

Chronological List of IT Policy Forum Discussion Topics and Results

2019-08: Endpoint Management

2019-04: IT Asset Inventory

2019-02: Continuous Diagnostics and Mitigation

2018-11: Credential Policy 

2018-08: Cloud Strategy 

2018-04: Digital Accessibility Policy Implementation

2018-02:

     – Communications Channels
     – Finding IT Policies
     – Security Education, Training, and Awareness (SETA)

2017-10: Continuous Diagnostics and Mitigation Policy

2017-04: No forum.

2017-02: Cybersecurity Risk Management: The Risk Executive.

2016-11: Being an IT Professional at UW-Madison: Guidelines, Best Practices, and Advice. (Notes to follow up team - – not yet formed at time of forum.)

2016-08: Vision and goals for strong authentication credentials. (Notes to UW-MIST, DoIT Middleware).

2016-04: Non-UW-Madison Devices and Services Recommendations - Next Steps. (Notes to CIO initiative for Personal Devices and Cloud Services.)

2016-02: No forum.

2015-11: No forum.

2015-08:
     – Web accessibility policy discussion results. (Notes to Web Accessibility Coordinating Group).
     – Web development and publishing process discussion results. (Notes to Web Accessibility Coordinating Group).

2015-04: There was large group Q&A after each presentation:
    – Data Goverance
    – IT Security
    – Portfolio Management
    – CIO Office

2015-02: No forum.

2014-11: No forum.

2014-08: Forum disussion results. (Notes to Data Discovery project)

2014-04: Discussion Results 2014-04 – IT policy awareness. (Notes to PPT).  Top items from each group

2014-02: Discussion Results 2014-02 – BYOD and Cloud Computing. (Notes to BYODandCloud – not yet formed at time of forum). See also POD.

2013-11: There was large group Q&A on:
     – Encryption Futures Task Force Recommendations (EncrypTF members were present), see also IEncrypt and ITransmit.
     – Guidelines for Use of non-UW-Madison Applications and Services, a.k.a. Cloud Computing (future BYODandCloud members were present).
     – Web Accessibility Policy ( ITAccessCG members were present), see also: ITAccessibility.

2013-05: Discussion Results 2013-04 – Bring Your Own Device. (Notes to BYODandCloud – not yet formed at time of forum). See also POD.

2013-02: Discussion Results 2013-02 – Electronic Records Management, records in the cloud, and legal issues. (Notes to BYODandCloud – not yet formed at time of forum.)

2012-10: Discussion Results 2012-10 – Web Application Security. (Notes to WebAppS – this team never formed – lost key staff and are rebuilding.)

2012-08: Discussion Results 2012-08 – Storage, Transmission and Encryption of Sensitive Information. (Notes to ITransmit team). See also: Report back (flipchart notes), and IEncrypt.

2012-05: Discussion Results 2012-05 – Information Incident Reporting and Response. (Notes to UW-MIST). See also: IReport

2012-02: Includes –
     Discussion Results 2012-02 – Electronic Records Management, email as a record (notes to UW-Madison Records Officer)
     Discussion Results 2012-02 Top 3 Issues – IT Policy Plan. (Notes to PPT). See also: IT Policy Plan FY 2012-2013

2011-11: Discussion Results 2011-11 – Shared Software Licensing Management. (Notes to SLiM). See also: Report back (flip chart notes) from all groups.

2011-08: Discussion Results 2011-08 – Personally Owned Devices.  (Notes to POD team). Includes Cloud Computing as well. See also nUWGuidance. (Notes to BYODandCloud team– not yet formed at time of forum.)

2011-04: Discussion Results 2011-04 – Cloud Computing. (Notes to POD). See also: Some Cloud Applications 2011-04-27, nUWGuidance. (Notes to BYODandCloud – not yet formed at that time)

2011-02: There was a large group discussion on Protection of Sensitive Information Duing Transmission (discussion lead to formation of ITransmit team). Consensus was to work on guidelines, awareness and education. See also: IEncrypt. (Notes to ITransmit – not yet formed at time of forum.)

2010-11: Discussion Results 2010-11 – Identity Management. (Notes to DoIT EIS with key EIS staff present at forum). There was quite bit of Q&A after each presentation. Participants were asked to record their thoughts on IdM-related policy issues on the evaluation forms (evaluation notes to DoIT EIS.)

2010-08: No forum.

2010-04: Discussion Results 2010-04 Flip Chart Summary – A summary of:
     Discussion Results 2010-04 Com – Communications and Implementation. (Notes to PPT).
     Discussion Results 2010-04 IdM – Identity Management. (Notes to DoIT EIS).
     Discussion Results 2010-04 IRM – Information Resource Management. (Notes to IRM – team never formed – was replaced eventually by Enterprise IT Decision Making, which was later replaced by IT Management and Governance Review.)
     Discussion Results 2010-04 PreP – IT Prepurchasing Process. (Notes to PreP – team never formed – was replaced eventually by Enterprise IT Decision Making, which was later replaced by IT Management and Governance Review.)
     See also: IT Policy Plan 2010-2011.

2010-02: Discussion Results 2010-02 – UW-Madison Portal Principles. (Notes to the portal team).

2009-11: Discussion Results 2009-11 – Identify Management. (Notes to DoIT EIS).

2009-08: Discussion Results 2009-08 – Personally Owned Devices. (Notes to POD).

2009-04: Discussion Results 2009-04 – IT Policy Plan. (Notes to PPT). See also: IT Policy Plan FY 2009-2010.

2009-02: Discussion Results 2009-02 – Shared [Software] Licensing Management. (Notes to SLiM team).

2008-11: Discussion Results 2008-11 – Storage and Encryption of Sensitive Information. (Notes to IEncrypt team).

2008-08: Includes –

     Discussion Results 2008-08 on IAccess – Use of Insitutional Access Control Services. (Notes to IAccess initiative).
     Discussion Results 2008-08 on IReport
  – Information Incident Reporting. (Notes to IReport team).

2008-04: Discussion Results 2008-04 – IT Policy Process. (Notes to PPT).

2008-02: Discussion Results 2008-02 – Includes:

     Information Incident Reporting. (Notes to IReport team).
     Protection of Archived Data. (Notes to OCIS, PPT).
     Shared [Software] License Management. (Notes to SLiM team).
     Storage and Encryption of Sensitive Information. (Notes to IEncrypt team).
     See also: IT Policy Plan multi-voting 2008-02 and the resulting IT Policy Plan FY 2008-2009.
     plus Policy Planning Team activity leading to the original process and plan. (Notes to PPT).

2007-11:  Discussion Results 2007-11 – Includes:

     IT Policy Process. IT Policy Plan. (Notes to PPT).

2007-08: Discussion Results 2007-08 – Includes:

     IT Policy Process. IT Policy Plan. (Notes to PPT).

Contact

  • No labels