Approved: September 2016
Through a fully integrated technology security system, the university enhances and preserves both the virtual and physical safety of staff, students, guests, and faculty. As part of the Northern Illinois University information technology governance structure, the Security Technologies governance sub-committee derives its authority from the IT Steering Committee (ITSC).
This sub-committee ensures the university addresses issues in a pragmatic manner while fostering an efficient, effective, safe, and secure environment. Conditions and practices are designed to address critical access needs in a manner which minimizes risk and maximizes physical asset and sensitive information protection.
The Security Technologies Sub-Committee is composed of faculty, staff and students who provide comprehensive representation from the NIU community.
Members may be nominated by anyone, but the IT Steering Committee approves all initial members and subsequent membership changes.
Members are expected to represent the best interest of the entire institution and not just their own unit. However, members are also expected to communicate the activities and decisions of the sub-committee back to their own unit and bring unit concerns back to the sub-committee.
Members will serve three-year terms, with membership terms staggered in equal measure throughout the sub-committee. All members may serve consecutive terms.
All members are expected to attend and participate in each meeting. If a member is unable to attend, a substitute should be authorized to attend and vote on behalf of the official committee member.
|Administration and Finance
|Human Resource Services
|Division of Information Technology (non-voting)
|Institutional Advancement / Foundation
|Outreach, Engagement and Regional Development
|Police and Public Safety
|Research and Innovative Partnerships
|Student Affairs and Enrollment Management
The chair will be responsible for:
Committees should schedule meetings on a monthly basis (or as determined by the Chair) to review the activities of its committees; approve/deny requests for purchases, system enhancements, or changes in active protocols or policies; establish priorities for resources; and develop recommendations for resources and proposals to be routed to the ITSC.
This Sub-Committee will report to the ITSC via one of the following methods:
Each request to the Security Technologies Sub-Committee and/or security committees should be written in the form of a proposal which will include: requestor or requesting body; description of the request; rationale or justification; available alternatives; funding strategy; project timeline.
Proposed significant changes to an active protocol must also go through this approval process.
Requests should be specific to security systems, their expansion, modification or upgrade; changes in security systems protocols; and/or the purchase of equipment and software that integrate with security technology systems.