|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1
Which of the following best characterizes the security principles at your institution?
|
|
Security is based on authentication to the network
|
|
Security is based on authentication to individual services
|
|
Other (please describe):
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The next set of questions identify which units within the institution take responsibility for security in accessing networked digital information. (If these questions do not apply, leave blank.)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Which units take responsibility for security in accessing networked digital information?(Check all that apply.)
|
|
Library |
Information Technology or Academic Computing |
Other |
Don't Know |
|
2 |
Library catalog data If you checked "Other Units," please list:
|
|
|
|
|
3 |
Commercial data leased by the Library If you checked "Other Units," please list:
|
|
|
|
|
4 |
Digital materials produced by the Library If you checked "Other Units," please list:
|
|
|
|
|
5 |
Digital materials produced in academic departments If you checked "Other Units," please list:
|
|
|
|
|
6 |
Administrative information, e.g., student and financial records If you checked "Other Units," please list:
|
|
|
|
|
7 |
Other type of networked digital information (e.g., e-journals, research data, computerized learning materials, web sites) Please specify:
|
|
|
|
|
|