Skip to end of metadata
Go to start of metadata

Prev Meeting | Next Meeting

Protection of Sensitive Information during Transmission (ITransmit)

Protection of Sensitive Information during Transmission (ITransmit) is developing recommendations for policy and guidelines that complement and extend the previous initiative that addressed Storage and Encryption of Sensitive Information (IEncrypt).

Tuesday, June 28, 2011, Rm 2281 CS

  1. Agenda Review

    See Other, below.
  2. Charter status

  3. Continue brainstorming
    Handout: ITransmit Brainstorming Results

    1. Identify issues (see partial list in handout)
    2. Add more detail to some issues


      • Need use cases.
        • Need to suggest how each case could be handled.
        • Sources of use cases include: InCommon, EDUCause, Internet2
        • Example use cases:
          • Data is leaving the workstation (to where?)
          • Data is leaving the subnet (to where?)
          • Data is leaving the intitution (to where?)
        • Scope of the policy will depend on the use cases.
      • Regarding organization of the use cases, possible audiences:
        • Students
        • Faculty
        • IT staff
        • Administrtion
        • Researchers
      • For each audience:
        1. What are sending?
        2. Why are you sending it?
        3. Who are you sending it to?
      • Regarding sensitive information:
        • Best approach: avoid sending it!
  4. Some additional questions:

    1. What is the goal of our effort?

      Action: Essentially as stated in the charter, but many questions remain about how to implement it.
    2. Who will gather more information?

      Action: Gary will create a use cases page on the wiki for team members to edit.
      (Thank you Jim, for helping us try to get it working – looks like there are still problems preventing us from editing.)
  5. Other?

    • We will revisit the question of Policy vs. Guidelines toward the end of our work, to see if we want to recommend that certain things be made policy (i.e mandates) rather than guidelines (i.e. recommendations.)
    • Gary will schedule two or more additional meetings.
    • Possible phone conference for our July 26th meeting
    • Gary will create an email list:
    • Gary will draft a recommendations document.

Parked Issues: (to re-visit later)

  • The question of policy vs. guidelines. Re-visit before we complete the recommendations.

Referred Issues:

  • The data stewards address who gets sensitive information and what are they allowed to do with it.

Future Meetings:

No files shared here yet.


  • No labels