DATE: March 20, 2008: 1:00-2:00 P.M.

Officers in attendance: T. Policano, J. Naud, C. Monikowski
Call to order by President Policano
Minutes of 2/13/09 approved by email

Old business
1. Adjunct Survey Committee

  1. President Policano attended the lively committee meeting just this morning. Other in attendance: Kristen Waterstram Rich, Paul Rosenberg, Barbara Heifferon, Carol Marchetti, Hank Mattice, Jeffrey Baker, and Lynn Wild; meeting was convened by K. Waterstram Rich.
  2. President Policano brought the results of previous survey to show what has been accomplished. There appears to be some confusion about the purpose of this survey; T. Policano explained that we are attempting to “understand who is working for us (RIT) and how they feel about the job they are doing”.
  3. We do appreciate the level of involvement we are having on this subject.

New Business
1. Information Security

  1. NTID is one of the first colleges to have an implemented a security policy for all of its computers that allows for all NTID bought computers to be scanned and managed remotely including the ability to both upload and download information at will anytime a computer is on network and also program without override user capability the sleep lockdown time of the system. In addition computer users are expected to lock through tethered cable all computers including laptops at all times; the question – is this people serving technology or technology serving people?
  2. There is a serious lack of shared governance regarding the level of security being enforced
      1. Despite claims from tech people, fac/staff are finding that their machines are behaving less robust resulting from software updates that the new security prevents the user from controlling; e.g. Microsoft has software myriad updates that hog the CPU and cannot be turned off by the user because a component of the update includes a security patch. The rule for the NTID installed security software forces updates for all installed software that includes a security component.
      2. Administration is confident that their security solution will not impact our work and that any inconvienience caused is small relative to the security risk caused by people who would add unauthorized social security numbers to their work computer after having their computers sweep checked for such numbers.

2. Record Archive policy
Bobby Colon, RIT Chief Legal Officer, has been asked to and has created a policy to limit RIT liability for information security.

  1. One approach to reduce the energy and cost to protect our info is to put a deadline on the archivability of that info; the policy is very specific – two or three years then all student info, except transcripts, must be eliminated from RIT records including faculty offices and computers.
  2. The purpose of the policy is to protect the Institute from liability, so regardless of faculty ability to manage past records of their students securely this info if it exists can be subpoenaed which is the problem…not enough discussion about the implications of this approach to limiting RIT liability has occurred and the policy is still under review.
  3. President Destler has suggested that the policy might be too hasty and too rigorous so there may be additional discussion.

3. Emergency Preparedness
After the recent power outage in many campus buildings, many people expressed concern that no information was available to the community. If we have a system for “emergencies” why weren’t we notified that this event was not an emergency? This topic will be addressed at the next Academic Senate meeting.

respectfully submitted C. Monikowski, 3/23/09, revised 2/24/09