The Council Committee on Communications shall appoint a subcommittee to review appeals of decisions to disconnect computers. The subcommittee will consist of:
- At least four members of the faculty appointed by the Committee on Communications, one of whom to serve as chair.
- VPISC or her/his designate
- University Information Security Officer or her/his designate
- The Committee on Communications may designate alternates to serve on the hearings of an appeal when its appointees are unavailable.
The owner of a disconnected system who believes that the threat that the system posed is outweighed by the impact of its disconnection on their academic mission may appeal the decision by documenting this belief in writing to the chair of the subcommittee. The chair or her/his designate may resolve the dispute amicably; failing this it will be heard formally by the subcommittee. The subcommittee will resolve conflicts as rapidly as possible within the constraints of fairness. It will establish and follow its own operating procedures.
If the subcommittee does not begin the proceedings within 5 working days in cases where the issue is a threat and not actual harm, or 30 working days in cases where ISC can document actual harm, the subject system must be reconnected. Once the subcommittee has begun the process, time limits will not be imposed.
In considering appeals, the subcommittee will balance the value of leaving machines connected against the associated risks. Its decision will be final. The only recourse for faculty whose appeals are denied will be to the Senate Committee on Academic Freedom and Responsibility. ISC may not appeal. However, it may re-disconnect the computer and restart the entire process whenever another trigger event is detected.
System owners who believe that their freedom of expression has been unduly infringed may, under the Guidelines for Open Expression, request that the Committee on Open Expression determine if the Guidelines were properly interpreted and applied to the disconnection of their system.
Interpreting this policy: As technology evolves, questions may arise about how to interpret this policy. The VPISC may as needed, after consultation with the Council Committee on Communications, publish specific rules interpreting this policy.
Advice: To minimize the likelihood of a serious computer security compromise, campus systems administrators are encouraged to configure their systems in accordance with the following standards:
https://www.isc.upenn.edu/security/bestPractices