Guiding Questions. Districts must ask themselves three questions before making ECSE purchases. If a district is unsure if an expenditure is allowable, they should contact the Fiscal Oversight Special Education Finance contact prior to making the purchase. The answer to this question should be yes. The district requires teachers, supplies, and equipment for the program to exist. However, some items are not necessary for the program to exist. For instance, a district would not need a washing machine in order to provide ECSE services.
Guiding Questions. Departmental Equity Recruitment, Hiring and Retention of VOM Staff Equity
Guiding Questions. How can we reduce the vulnerabilities? How can we reduce the consequence of the incidents? How can we reduce the likelihood that the threats will initiate an attack? Are there other ways to reduce the likelihood of threat scenarios and incidents?
Guiding Questions. What are the tangible or intangible entities of value for the party (client) that could potentially be harmed by a cyber-incident? Here we should pay special attention to confidentiality, integrity or availability of data or services that the party is responsible for or dependent upon.
Guiding Questions. What incidents could directly harm the identified assets? What incidents could result from a successful attack?
Guiding Questions. What makes it possible for an attack to succeed? Where are the weaknesses in our defence mechanisms?
Guiding Questions. What observable events at the network layer could give useful information about the likelihood/frequency of attacks? (Network-layer indicators.) This question should be asked for each identified threat scenario and incident. What observable events at the application layer could give useful information about the likelihood/frequency of successful or unsuccessful attacks? (Application-layer indicators.) This question should be asked for each identified threat scenario and incident. What information can we get from vulnerability scanners or security tests? (Test result indicators). This question should be asked for each identified vulnerability. What do we otherwise know about the threats, vulnerabilities, threat scenarios, incidents or assets that could help us assess the level of cyber-risk? (Business configuration indicators.) These questions should be asked for each element of the risk model.
Guiding Questions. What types of attack can a threat initiate? Where are the interfaces between the target system and cyberspace, and how can attacks be launched through these interfaces?
Guiding Questions. Which malicious actors could want to perform a cyber-attack? Here we should consider all possible motives and intentions, including financial gain, revenge or grudges, political or religious agendas, espionage, or simply fun and a desire to prove one's ability. Which non-malicious actors could potentially initiate cyber-incidents through, for example, neglect or lack of competence?
Guiding Questions. 4.1 Considering the following questions should help you to determine which one of the six different Intellectual Property ownership options is best suited to the particular set of circumstances relevant to your Project.
4.2 However, you should note that considering and answering the questions in this Guide may not provide a definitive way forward and you may also find that there are other considerations (not mentioned in this Guide) that, because of your situation, you may wish to take into account.
4.3 Agreement on the ownership and access to the Results of the Project should be established as part of the Collaboration Agreement, before work starts.8 By reaching a clear understanding on the allocation of ownership and on access to the Intellectual Property Rights in the Results, and reflecting this position in the Collaboration Agreement, the Partners can reduce uncertainties, promote trust and protect their rights.