Smith College Admission Academics Student Life About Smith news Offices
  Home > Offices > Information Technology Services > TARA > Security > Guidelines for Department Heads  
   Reset Password     Smith Directory    Smith Portal   Server Status  Smith Software
 
       
 



Categories
Welcome
Getting Started
25Live Scheduling
Account Forms
Admin Systems*
BannerWeb
Cloud Storage
File Transfer
Google Apps
   Smith Mail
   Contacts
   Calendar
Internet Browsers
Macintosh
   Connecting
   Backup & Restore
   Upgrading
   Related Apps
   Other Info
Microsoft Office
   Excel
   PowerPoint
   Word
Microsoft Windows
Mobile Devices
Moodle
Passwords
Printing
Security  
Smith Network
Smith Portal
Smith ResNet
Standard Software
Telephones
Terminal Emulators
Training
Unix
Viruses & Spyware
Web Development
Wireless Computing

*Smith login required

 

GUIDELINES FOR DEPARTMENT HEADS & DATA CUSTODIANS


As part of Smith's strategic initiative on information security, ITS has asked the head of each adminstrative department to review departmental procedures for handling and storing legally-protected Personal Information (PI) data.

In support of this process, department heads have been asked to submit the following two documents to Ben Marsden, ITS Director of Systems & Network Services, by March 31, 2011:

  • Department PI Data Risk Assessment Summary Report
  • Department PI Data Location Spreadsheet

The list below shows one possible sequence of steps department heads may follow to complete this task, but departments are free to choose their own variations.

  1. Use a department meeting to launch the information security data-collection phase.

    Review the goals of the initiative as needed and ask each staff member to complete the Individual PI Data Risk Assessment Checklist (PDF).

    Remind each staff member that instructions for finding their Computer Identifier are available on the Security web page.

  2. Collect individual checklists from each staff member and consolidate the information they contain to complete the Department PI Data Risk Assessment Summary Report (PDF).

  3. Review the individual checklists to determine which staff members have legally-protected Personal Information (PI) data stored on the hard drive of their desktop or laptop computer.

  4. Follow up with any PI-data-holders to complete the required fields in the Department PI Data Inventory Spreadsheet (Excel document).

  5. Submit the completed Information Risk Assessment Summary Report and PI Data Location Spreadsheet to Ben Marsden by March 31, 2011.



Questions?

If you have any questions, please call the User Support Center at x4487 or send email to 4its@smith.edu.


Back to top>

 

 


Copyright © 2014 Smith College Information Technology Services  |  Stoddard Hall 11  |  Northampton, MA 01063
413.585.4487  |  Questions or comments?  Send us email
 |  Last updated January 10, 2013

DirectoryCalendarCampus MapVirtual TourContact UsSite A-Z