About the Office of Information Security
The job of coordinating information security at Penn is handled by the Office of Information Security, a unit of Penn's Information Systems and Computing (ISC) division.
What we do
The Office of Information Security establishes, implements and maintains
security programs to assist management in the protection of computing
resources and associated information assets against accidental or unauthorized
modification, destruction, or disclosure. Our responsibilities include:
- Establishment of appropriate University-wide policies, standards and
guidelines for data and physical security safeguards pertaining to information
- Recommendation and review of the implementation and maintenance of
data security software that provides controlled access and use of sensitive
application systems, database management systems, computer operating
systems, communication networks, and computer hardware.
- Providing consultation into technical and application development
efforts involving computer data security and integrity issues.
- Providing a forum for review, counsel, education and communication
of computer security administration procedures.
- Maintaining awareness of existing and proposed legislation and regulatory
laws pertaining to information system security.
- Participation in investigations of information security violations.
- Educating the general community about the security risks of electronic
information systems and provide targeted information informing them
of steps they can take to minimize those risks.
Information Security and Network Monitoring
How to reach us
3401 Walnut Street
Philadelphia, PA 19104-6228 USA
Telephone:(215) 898-2172 (An Information Security representative can be reached through this number
24 hours a day, 7 days a week. Please
read the page on reporting security concerns for more information.)
Fax: (215) 573-2037 (please call or e-mail in advance to alert to incoming
When contacting Information Security regarding sensitive and/or confidential
issues, it is recommended that all email correspondence be PGP-signed and
-encrypted whenever possible, using one of the Information Security public
keys that can be found at the PGP Public Key Information
Information Security Personnel
Penn Information Security Officer
Information Security Specialists
Dana Lane Taylor
firstname.lastname@example.org (PGP key)
email@example.com (PGP key)
Last updated: Thursday, November 29, 2012