PPT-UUK Guidance on Security Sensitive Research

Author : jane-oiler | Published Date : 2016-07-10

Prof Tom Sorell Warwick University Outline Background Nottingham case Issues How picked up in the guidance Wider interpretation of securitysensitive research Background

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "UUK Guidance on Security Sensitive Resea..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

UUK Guidance on Security Sensitive Research: Transcript


Prof Tom Sorell Warwick University Outline Background Nottingham case Issues How picked up in the guidance Wider interpretation of securitysensitive research Background UUK httpwwwuniversitiesukacukhighereducationDocuments2011FreedomOfSpeechOnCampuspdf. Comments and suggestions regarding this draft docu ment should be submitted within 60 days of publication in the Federal Register of the notice announcing the availability of the draft guidance Submit comments to the Division of Dockets Management H Implementing SPG 601.33. in Your Unit. Accessing . or Maintaining Sensitive Institutional . Data. on . Personally Owned . Devices . (SPG 601.33). Last updated . 6/13/. 14. Overview. Why U-M needed a policy. Mary Maynard. University of York. Thinking about cross-cultural research: 4 personal reasons for dwelling on issues of cultural sensitivity. The nature of culturally sensitive and cross-cultural research. Dr. Catrina Purvis, CISSP, Esq.. Chief. Privacy Officer. and Director of Open Government. Office of the Secretary. United States Department of Commerce. (202) 482-1190. c. purvis. @doc.gov. Rod Turk. 1. No one plays a greater role in security than you.. This briefing will:. Identify your personal security responsibilities. Provide a basic understanding of SBU, FOUO, Protecting Proprietary Information and PII. October 22,. . 2014. Agenda. Introduction – Scott Douglass. Legal Issues – Laure Ergin. Risk & Challenges - Kirk Die. What IT is Seeing & Doing – Jason Cash. Unit & Employee Responsibilities – Karl Hassler. Agenda. Howard Noble – Research Support ACIT (IT Services). Rowan Wilson – Research Support ACIT (IT Services). Claudia . Kozeny-Pelling. – Research Services. Duncan Tooke – Information Security. of. . Security Lockdowns. Aaron Margosis. Principal Consultant. Microsoft Services. SIM304. Session Objectives and Takeaways. Session Objective(s): . Understand and explain tradeoffs of security and usability. Charles Schmidt. Sept 23, 2011. 2. Who Am I. The MITRE Corporation. A U.S. non-profit research company chartered to work in the public interest. No products – what we are talking about is free. Other companies can and have productize this work. Demystifying Data Loss Prevention (DLP) . in SharePoint 2016. Presented to:. Cincinnati SharePoint User’s Group. April 26, 2018. Owner/Principal Architect. Don’t . Pa..Panic. Consulting. Microsoft Community Contributor. (. WHO . Technical Report Series, no.961, . 2011, . Annex . 9. ) . &. Technical supplements. Umit Kartoglu/Denis . Maire. Essential Medicines and Health Products. Developed by the WHO Task Force on Regulatory Oversight on Pharmaceutical Cold Chain Management. Thank You. Dan . Hubbard. Guido Sanchidrian. Mark Cunningham . Nadeem . Bhukari. Alice Decker. Satheesh. . Sudarsan. Matt . Broda. Randy . Bunnell. Megan . Bell. Jim Hunter. Pam Fusco. Tyler Shields. - Update at 26 Nov 2013. Graham Gardiner and Gerard Oakes. Recap. New GSC Policy issued to Government departments in Dec . 12. Minister for Cabinet Office (Francis Maude) announced GSC changes as part Civil . Thursday October 14. th. 2010. 2. Information Security Officers (ISO). Terry Peters . (352)376-1611 x4114. Patrick Cheek . (352)376-1611 x4492. 3. Overview. Protocol Approval. Sensitive Information.

Download Document

Here is the link to download the presentation.
"UUK Guidance on Security Sensitive Research"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents