Building IT Policy Programs for Higher Education

Building IT Policy Programs for Higher Education

Chris Schreiber
This is a sample of the book's content.Buy on Leanpub

Table of Contents

Building IT Policy Programs for Higher Education

  • Executive Summary
  • Part I: Foundations
  • Chapter 1: The As-Built Standard
    • Design Drawings vs. As-Built Reality
    • The Stakes: What Happens When Governance Debt Comes Due
    • The Promise: What a Well-Built Program Makes Possible
    • The Blueprint Is Not Your Building
    • Chapter 1 Key Takeaways
  • Chapter 2: The 2026 Policy Landscape
    • A Yearly Snapshot of the Sector
    • About the Data
    • Three Patterns That Define the Landscape
    • Additional Gaps Across the Sector
    • Interpreting the Data
    • What the Data Leaves Out
    • Chapter 2 Key Takeaways
  • Chapter 3: The Site Conditions
    • The Warning
    • The Soil: Shared Governance
    • The Light: Academic Freedom
    • The Access: Open Campus
    • Shadow IT: The Unofficial Infrastructure
    • Chapter 3 Key Takeaways
  • Chapter 4: Framework Alignment
    • The Defensibility Imperative
    • Four Common Frameworks
    • Right-Sizing for Your Team
    • The Layered Approach
    • The Metaframework Approach
    • Chapter 4 Key Takeaways
  • Part II: The Framework
  • Chapter 5: The Blueprints
    • The Load-Bearing Walls
    • The Governance Hierarchy
    • Chapter 5 Key Takeaways
  • Chapter 6: The Policy Inventory
    • The 17 Policies
  • Chapter 7: The Standards Inventory
    • The 24 Standards
  • Part III: Applying the Framework
  • Chapter 8: Structural Loads
    • The Weight Your Building Must Support
    • A. The Foundation: Universal Loads
    • B. Environmental Loads
    • C. Mission-Specific Loads
    • Calculating Your Institution’s Regulatory Load
    • Chapter 8 Key Takeaways
  • Chapter 9: Designing for Research
    • The Research Distinction
    • Principal Investigators Are Entrepreneurs
    • Research Computing: A Different Architecture
    • How Research Governance Works
    • How Research Data Flows
    • Chapter 9 Key Takeaways
  • Chapter 10: Designing for the Highest Tiers
    • The Too-Many-Programs Trap
    • Risk-Tiered Data Classification
    • Minimize the Scope of Your Most Restrictive Tier
    • Mapping Regulations to the Framework
    • Supporting New Compliance Requirements
    • What Makes the Layering Work
    • From Structure to Execution
    • Chapter 10 Key Takeaways
  • Part IV: Building Your Program
  • Chapter 11: Conducting the Inspection
    • Documentation Meets Reality
    • If You Only Have 20 Hours
    • The Inspection Process
    • Step 1: Gather Your Documentation
    • Step 2: Create Your Inventory
    • Step 3: Assess Against the Framework
    • Step 4: Prioritize the Gaps
    • Step 5: Document Your Findings
    • Your Inspection Is Complete
    • Additional Support For Your Assessments
    • Chapter 11 Key Takeaways
  • Chapter 12: The Improvement Roadmap
    • From Inspection to Roadmap
    • Why Annual Review Is the Standard
    • The Prioritization Hierarchy
    • Phase 1: Shore Up the Foundation
    • Phase 2: Address the Structural Loads
    • Phase 3: Future-Proof the Structure
    • Building This Year’s Roadmap
    • The Culture Work
    • The Project Toolkit
    • Chapter 12 Key Takeaways
  • Conclusion: The Path Forward
    • Document Information
  • Glossary of Terms
Building IT Policy Programs for Higher Education/Part I: Foundations

Part I: Foundations

Up next

Chapter 1: The As-Built Standard

In this chapter

  • Part I: Foundations