Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Community Resource - Institute of Computer Policy and Law
Message from email@example.com
********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
I don’t know if this mirrors your experience but in recent months I’ve received a great many requests for information and presentations to various campus groups on (what our Trustees call) cyber-security. Our campus stakeholders are increasingly aware of these issues since they are being well covered in the media with reports on university intrusion incidents, the NSA disclosures, etc., plus broad uncertainty about the meaning of privacy in the digital world.
The information/presentation requests come from some of the expected sources including the Audit Committee, the full Board of Trustees, our Executive Risk Management Committee, and others. Earlier this week I hosted a lunch for a dozen student interns where this topic proved to be of huge interest to them. (No kidding. I thought it would have been on-line learning, but what do I know?)
I’m a career-long advocate for the power of the community when it comes to wrestling with shared gnarly problems. And so – forgive me for shilling a Cornell program – I believe an excellent resource is the Institute of Computer Law and Policy, a forum where these issues are in focus and energetically debated. This year’s program has been significantly revamped from prior years and features privacy, accessibility, intellectual property, scholarly publishing and network security issues. The meeting will be held September 18-20th at Cornell in Ithaca, New York. For more, see: icpl.cornell.edu
I hope this message is received as it is intended – to highlight a timely and useful resource for our community as we all look for solutions in times of ambiguity. I would equally welcome your suggestions for how we exercise our leadership mandate to better position our institutions in preserving the essential openness required for academic freedom while, at the same time, inhibiting unauthorized access to the jewels of academic intellectual property.
CIO and Vice President, Information Technologies