1 / 7

Achieving Policy-Law Balance in Computer Abuse Cases: Bridging Expectations and Realities

Join our panelists for insights on navigating legal challenges in real-life computer abuse cases. Topics include HIPAA compliance, hate mail consequences, international identity theft prevention, and law enforcement cooperation. Learn about key policies, partnerships, incident response, and more.

maclennan
Download Presentation

Achieving Policy-Law Balance in Computer Abuse Cases: Bridging Expectations and Realities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Scales of Justice Balancing Policy and Law Against Expectations in Real-Life Computer Abuse Cases

  2. Panelists • Patti Orr: HIPAA and IT: A Prescription for Partnership and Leadership! • Director of User Services. Wellesley College • Merri Beth Lavagnino: Anonymity Doesn’t Buy a “Get Out of Jail Free” Card for Hate Mail Sender • Deputy Information Technology Policy Officer Indiana University • Jenny Mehmedovic: Border Crossing: Working with the Feds to Prevent International Identity Theft • Coordinator of IT Policy & Planning University of Kansas

  3. Law, Policy and Partnership • Law • Health Insurance Portability Accountability Act • Harassment and Intimidation • Illegal Immigration Reform and Immigrant Responsibility Act of 1996 • USA-Patriot Act • SEVIS • Family Education Rights Privacy Act • Fraud and Abuse of Computer Act

  4. Policy • Computer Users' Privileges and Responsibilities Policy • http://www.indiana.edu/~uitspubs/iu001/iu001.pdf • IT Security Policy • www.security.ku.edu • Incident Response Procedures • Law Enforcement Response Procedures • Crisis Communications Policy/Procedures

  5. Partnerships • Country Police and Prosecutor • Dean of Students • University Police • University Counsel • University Policy Office • University Relations • IT Security • Health Services • EDUCAUSE sites!

  6. Managing Expectations • Victims: Retribution and Justice • Information about policy process and discipline • Prosecutor – University – Victim interactions • Balancing legal requirements and staff compliance…for “customers/clients/users” • Balancing victims, law enforcement and public relations

  7. Questions?

More Related