penn state mark

Priorities for Excellence: The Penn State Strategic Plan 2009-10 through 2013-14

Goal 6: Use Technology to Expand Access and Opportunities
Strategy 6.4: Protect the Security and Integrity of the IT Infrastructure

Universities have become increasingly opportunistic targets for criminal elements and mischief-makers who seek to disrupt information technology services and, increasingly, to steal valuable information or otherwise use our network capabilities for illegitimate ends. Penn State’s network is probed tens of millions of times in a typical week for security weaknesses, and the distributed responsibility for our IT infrastructure and network administration provides ample opportunities for invasion. The openness of University networks, coupled with the high bandwidth of Internet 2 data manipulation and transmission capabilities, create a unique set of circumstances for IT management.

The Vice Provost for Information Technology must continue to develop both the technical infrastructure and educational programming to impress upon faculty, staff, and students the importance of everyone doing his or her part to maintain the security of Penn State’s information technology networks and infrastructure. Planning for the possibility of natural or other disasters must also be incorporated into future IT development, given that the University cannot operate long without core information technology support.

  • Vice Provost for Information Technology—Primary
  • Executive Vice President and Provost