5.+Safeguard+Technology


 * Safeguarding Technology **


 * Risk Assessment **

Identify Critical Systems And Time Sensitive Information || Hardware: Smart Response Clickers, Smart Slate, SmartBoard screens, Zoom H-2 Recorder, Smart Podium, Bluetooth
 * Step 1

Software: Centeo, Bluetooth || Estimate the Value Of System Components || Hardware: Smart Response Clickers, Smart Slate, SmartBoard screens, Zoom H-2 Recorder, Smart Podium, Bluetooth
 * Step 2

Software: Centeo, Bluetooth || Identify Threats || Natural: Tornados, Power Surge, Thunder Storms, Electromagnetic Pulse Human (Intentional): Sabotage, Theft, Hacking Human (Unintentional): Virus, Food or Spilled Drink, Construction work || Identify Vulnerabilities || Physical Concerns: Unlocked Rooms Hardware/Software Issues: Damage to Smart Response Clickers, Smart Slate, SmartBoard screens, Zoom H-2 Recorder, Smart Podium Human Concerns: Forget to Return Item, Take Without Signing Out, Mishandling by teacher or student. || Estimate the Likelihood of Potential Penetration Becoming Actual Penetration || Human Threats (accidental and intentional): This type of threat is more apt to happen than physical.
 * Step 3
 * Step 4
 * Step 5

Physical Threats: There is less likelihood that this type of threat will happen. || Identify Countermeasures Against Perceived Threats and Vulnerabilities || Human Threats: AUP, Training, Virus Protection, Security Force, Equipment for checkout in locked cabinet in a locked room.
 * Step 6

Physical Threats: Hurricanes are few and far between. Classrooms and windows are locked and heavily patrolled. || Estimate Cost of Implementing Countermeasures || There would be no additional cost for the human threats. AUP, virus protection, locked equipment cabinet are already in place. Security force is in place and in the budget. To guard against physical threats, all equipment is already insured. || Overview of Risk Assessment and Selected Suitable Countermeasures for Implementation || Verify that AUP policy is available and given out with equipment (or posted in room). Verify that virus protection is updated. Verify the equipment placement when not in use/locked facility. Verify security rounds and information on equipment residency. Verify insurance coverage of equipments. ||
 * Step 7
 * Step 8

Acceptable Use Policy **
 * Security Policy **
 * [] **
 * [] **

[]
 * Copyright/Fair Use Policy **

Meeting minutes below.
 * Communication with Technology Committee **