The Center for Education and Research in Information Assurance and Security, or CERIAS, is the world's foremost University center for multidisciplinary research and education in areas of information security. Our areas of research include computer, network, and communications security as well as information assurance.

This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser or Internet device. (Why?)

Center for Education and Research in Information Assurance and Security

COAST Security Archive Logo Category Index: /pub/doc/institutional_policies


No Pointing!

This WWW page was generated automatically. Link makers should not point their links to this page. If you must, please make a link to the search entry point.

Purdue University, Purdue Access to Records Policies
Abstract: Disclosure Of University Records: Procedures For Use In Connection With The "Access To Public Records" Law, And In Response To Third-Party Subpoenas.

Purdue University, Purdue-FERPA
Abstract: A open letter to all Purdue University students and staff concerning University policy regarding the "Family Educational Rights and Privacy Act of 1974" (as Amended).

Purdue University, Purdue Data Ownership
Abstract: A letter to Deans, directors,and Heads of Schools, Divisions, Departments, and Offices, and Regional Campus Chancellors, concerning the Security of data on the administrative data processing center's computing equipment.

Sally Hambridge, Jeffrey C. Sedayao, Horses and Barn Doors: Evolution of Corporate Guidelines for Internet Usage
Abstract: Intel's Internet usage policy evolved from practically non-existent to explicitly defined - all in reaction to changing conditions and security threats. This paper covers the evolution of Intel Internet access policy, a continual struggle to close the barn doors before the horses get out . Throughout the paper, it outline key lessons author have learned during the policy-making process. It discusses Intel's first taste of the Internet, Intel's policy-making process, the open access policy of that period, and the resulting security challenges. It then covers the imposition of a stricter policy and implementing a firewall to enforce that policy The paper proceeds to describe today's problems, the majority of which center around Intel people accessing the Internet. In response to this problem and growing numbers of people wanting to use the Internet, Intel has drawn up explicit corporate guidelines on Internet use. These guidelines are then compared to various Acceptable Use Policies and Netiquette guides. The paper concludes with some additional tasks Intel is planning in order to keep the barn doors closed .

_____

O Built by Mark Crosbie and Ivan Krsul.

Security Archive Page Security Archive Homepage.

COAST Homepage COAST Project (CERIAS)Page.

Purdue CS Homepage Purdue CS Dept page.


security-archive@cerias.purdue.edu (COAST Security Archive)