Smith College Admission Academics Student Life About Smith news Offices
  Home > Offices > Information Technology Services > TARA > Security > Guidelines for Department Heads  
   Reset Password     Smith Directory    Smith Portal   Server Status  Smith Software

Getting Started
25Live Scheduling
Account Forms
Active Directory
Admin Systems*
Cloud Storage
File Transfer
Google Apps
   Smith Mail
Internet Browsers
   Backup & Restore
   Related Apps
   Other Info
Microsoft Office
Microsoft Windows
Mobile Devices
Smith Network
Smith Portal
Smith ResNet
Standard Software
Terminal Emulators
Viruses & Spyware
Web Development
Wireless Access

*Smith login required



As part of Smith's strategic initiative on information security, ITS has asked the head of each adminstrative department to review departmental procedures for handling and storing legally-protected Personal Information (PI) data.

In support of this process, department heads have been asked to submit the following two documents to Ben Marsden, ITS Director of Systems & Network Services, by March 31, 2011:

  • Department PI Data Risk Assessment Summary Report
  • Department PI Data Location Spreadsheet

The list below shows one possible sequence of steps department heads may follow to complete this task, but departments are free to choose their own variations.

  1. Use a department meeting to launch the information security data-collection phase.

    Review the goals of the initiative as needed and ask each staff member to complete the Individual PI Data Risk Assessment Checklist (PDF).

    Remind each staff member that instructions for finding their Computer Identifier are available on the Security web page.

  2. Collect individual checklists from each staff member and consolidate the information they contain to complete the Department PI Data Risk Assessment Summary Report (PDF).

  3. Review the individual checklists to determine which staff members have legally-protected Personal Information (PI) data stored on the hard drive of their desktop or laptop computer.

  4. Follow up with any PI-data-holders to complete the required fields in the Department PI Data Inventory Spreadsheet (Excel document).

  5. Submit the completed Information Risk Assessment Summary Report and PI Data Location Spreadsheet to Ben Marsden by March 31, 2011.


If you have any questions, please call the User Support Center at x4487 or send email to

Back to top>



Copyright © 2014 Smith College Information Technology Services  |  Stoddard Hall 11  |  Northampton, MA 01063
413.585.4487  |  Questions or comments?  Send us email
 |  Last updated January 10, 2013

DirectoryCalendarCampus MapVirtual TourContact UsSite A-Z