Document 12141085

advertisement
Data Security and Stewardship Committee
Cordelia Camp 101a
Wednesday, October 28, 2009
Present Pam Buchanan, Steve Christison, Craig Fowler, Lisa Gaetano,
Larry Hammer, Debbie Justice, Scott Koger, Mary Ann Lochner,
Zeta Smith, and Scott Swartzentruber
Absent Mike Stewart and Kay Turpin
Guests Robert Edwards and Sam Miller
Recorder Jenny Owen
Handout
Matrix of Mobile Communication Devices & Security Options
Approval of Minutes

Craig Fowler made a motion to approve the minutes from the
Data Security and Stewardship Committee (DSSC) meeting that
was held on Wednesday, October 14, 2009. There was no
opposition, and the motion carried unanimously.
General Information

Fowler clarified that the Chancellor is the only one that can
approve emeritus applications and that those decisions are
reported to the Board of Trustees.
Action Items Confidentiality Agreement in
Policy 95

After a brief discussion about how to implement the
confidentiality agreement that is attached to Policy 95 - Data
Network and Security Management, DSSC members approved
Fowler’s suggestion to have Debbie Justice coordinate with
Anna McFadden to arrange for Policy 95 and its confidentiality
agreement to be set up as a course in WebCat. Fowler explained
that after the course/training is completed, the confidentiality
agreement and a certificate indicating completion of the training
could be printed, signed and sent to Human Resources for filing.
This will only have to be done one time by employees.
Fowler will take this to Executive Council for their approval.

Security for Mobile
Communication Devices

Fowler and several other DSSC members participated in a
conference call on Monday, October 26 with John Girard
(Gartner analyst) about security for mobile communication
devices. Brief summary of items discussed:
o Smart phones should be viewed as small laptops.
o People were 15 times more likely to lose a smart phone
than a laptop.
o Gartner analyst said best security approach for mobile
communication devices would be Blackberrys operating
from a Blackberry Enterprise Server (BES).
o Windows Mobile 6.1 with Exchange 2.7 had fairly good
capabilities but wasn’t very popular.
o iPhones, at a minimum, would be the 3GS family and
above.
Talked about blocking IMAP—can block by mailbox.
Talked about being able to use Outlook Web Access
(OWA).
o Some places have additional charges for supporting
different devices—the more devices that are supported—
the higher the costs.
o Have passwords with 10 characters.
o If no activity after 10 – 15 minutes, devices lock down.
o Encrypt from core memory and removable media.
o Consider using remote swipe.
o If smart phone is offline longer than 10 days, it should
lock down.
o Talked about different ways to block attachments.
DSSC members reviewed the matrix that Scott Koger was asked
to put together on various devices that were being considered and
their security options.
Sam Miller asked if DSSC members had an idea on how much
security was good enough. He added that he didn’t necessarily
advocate a particular device, but would rather the group come up
with ways to “incentivize faculty and staff with a security
mindset.”
o
o


Action Items




A task force was formed to create a first draft of a tiered approach
to security of mobile communication devices. Lisa Gaetano
agreed to be the chairperson. Members are Scott Koger,
Mary Ann Lochner, Larry Hammer, and Pam Buchanan. They
will have their first draft ready for review and discussion at the
next DSSC meeting on November 10.
Koger will follow up with Shandon Bates on filtering by device
and also what is involved with turning off email forwarding.
Koger will follow up with Anne Vail on what the impact might be
if IMAP were turned off.
Scott Swartzentruber will review Policy 93 – Electronic Mail
Policy for possible changes or modifications and will report his
findings at the next meeting.
Download