6. Practice of IA Encouraged Throughout the Institution
6.a. Provide a link to the institution's security plan and/or policies.
The Oklahoma Office of State Finance establishes and communicates security policy, procedures, guidelines and best practices for the protection of the information assets of the state of Oklahoma. As a state agency, the Oklahoma Department of Career and Technology Education (ODCTE) complies will the security policy, procedures and guidelines established by the Oklahoma Office of State Finance. ODCTE continually reviews its security policies and practices and provides security awareness training to all employees. ODCTE's security policies are located at http://www.okcareertech.org/about/state-agency/divisions/sdcs/sdcs-resources/agency-policies/. Additional information on ODCTE's information security is located at http://www.okcareertech.org/about/state-agency/divisions/sdcs/information-security
Technology centers comply with the Children’s Internet Protection Act (CIPA) enacted by Congress to address concerns about access to offensive content over the Internet on school and library computers. Schools and libraries subject to CIPA are required to adopt and implement an Internet safety policy addressing: (a) access by minors to inappropriate matter on the Internet; (b) the safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications; (c) unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; (d) unauthorized disclosure, use and dissemination of personal information regarding minors; and (e) measures restricting minors’ access to materials harmful to them. Technology center students are also required to sign an Internet access, Internet safety, and acceptable use policy
To review technology center policies, visit the websites listed below:
6.b. Institution designated Information System Security Officer or equivalent. Provide name, position and job description for person or persons responsible for information security.
Oklahoma Department of Career and Technology Education
Name and Title: Corey Croci, Information Security Officer
Central Technology Center
Name and Title: Cheryl Baugus, Network Administrator
Great Plains Technology Center
Name and Title: Kevin Chambers, Director of IT
Meridian Technology Center
Name and Title:Matt Trumble, IS Manager
Mid-America Technology Center
Name and Title: Ted Jackson, IT Coordinator
Tulsa Technology Center
Name and Title: Joe Slitzker, IT Security Engineer
6.c. Provide evidence of the implementation of the institution's IA security plan to encourage IA awareness throughout the campus.
The CareerTech System implements a number of initiatives to emphasize the importance of information assurance. Faculty members from all program disciplines provide students an orientation to school policies, and they are required to sign an Internet access, Internet safety and acceptable use policy (click to see sample). Faculty and staff also attend information security awareness training as part of their continuing education requirements.
To raise information security awareness, technology centers host a number of events to reinforce the importance of security. For example, Tulsa Technology Center hosts the annual Cyber Spook House event (click to see poster). During this event, teams of IA students identify a security awareness topic, research the topic and prepare a trade show booth. Each booth is complete with decorations, brochures, cyber demonstrations and presentations. Students throughout the campus, counselors and parents attend this event. Technology centers also work collaboratively across disciplines to emphasize information assurance.
To raise general public awareness of information assurance the Oklahoma HORIZON television program, sponsored by CareerTech, has highlighted information assurance on several of its weekly shows, which are broadcast in nine states on national television stations and 325 cable systems. See sample broadcasts below.
Jobs in Cyber Security