Abstract
Institutions use a variety of approaches to resolve computer abuse incidents. A moderated discussion will include examples from institutions with distinct approaches to IT policy. Topics will include maximization of resources through internal and external collaboration, existence of relevant institutional policies, and handling of issues related to federal and state law.