When the Rubber Meets the Road: Moving from IT Policy Development to Implementation

Abstract

So, you have a solid policy framework to address information security and data access/privacy issues on campus. Now what? Have the policies and procedures been implemented, and are they being enforced? Key elements of policy implementation in decentralized-support institutions will be presented, including risk assessment, management, communication, and training.

Download Resources