Security Policies and Procedures Panel


Security policies are often developed to comply with legal requirements and minimize risks. Security policies and procedures are also put into place because they provide direction for organizational and individual behavior. This panel will address best practices for policy development in the areas of acceptable use, identification of departmental security contacts, security policies (such as data access, authorization and authentication, use of antivirus software, passwords, secure communications protocols, and encryption keys), procedures for incident response and disaster recovery, and business continuity planning. Resources available from the Cornell/EDUCAUSE Institute for Computer Policy and Law will also be introduced.

Download Resources