Date: Thu, 15 Sep 2005 10:33:31 -0700 To: stewart@cs.sdsu.edu From: James FrazeeSubject: LMS Summit and SDSU Campus Visit Attached is the background on the LMS Summit and related Chancellor's Office campus visit to SDSU on September 21. As a reminder, we will be meeting at the Faculty-Staff club on the patio from 10am-noon, and lunch will be provided. In addition to myself, Jim Julius and Jon Rizzo from ITS, below are the people who have been invited to participate. Brock.Allen - CTL Mary Shojai - Disabled Student Services Marilyn Hall - Library John Ross - AAIT Kris Stewart - University Senate (IT Committee Chairperson) Bernie Dodge - Faculty Sharon Lightner - Faculty Beth Pollard - Faculty
Recent Email from ITSO announced the hosting of the FERPA workshop on campus 26Oct05 1-3pm
FERPA = Family Education Rights and Privacy Act http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html ------------------------------------------------------------------------ The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99) is a Federal law that protects the privacy of student education records . The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. FERPA gives parents certain rights with respect to their children's education re cords. These rights transfer to the student when he or she reaches the age of 18 or attends a school beyond the high school level. Students to whom the rights h ave transferred are "eligible students."
From: Felecia VlahosTo: sdsu-cert@lists.sdsu.edu Subject: Security tip for the day Date: Mon, 03 Oct 2005 17:07:13 PDT Today is the first working day of National Cyber Security Awareness Month and in observance of this month the IT Security Office will email a security tip a day during the month of October (Monday through Friday). Security tip for today: (also discussed in today's NAC-Security meeting) The automatic EPO agent deployment is reported to be 60-70% effective on campus. Please use the automatic deployment method for the first level of deployment and then follow up with a visit to each desktop/server as soon as time allows to ensure the agent is properly installed. Felecia Vlahos, CISSP Information Security Officer San Diego State University 619-594-4049, fvlahos@mail.sdsu.edu
The second item is about leveraging CSU assets to get certain softwares and assessment tools. Departments struggle to pose appropriate questions regarding technology use. Some CSU campuses have subscriptions to programs like "Flashlight" which enable faculty to create surveys and assessments quickly and tally up results, along with statistics. This is important information for WASC evaluations and departmental reviews.