News

Pro-Palestine Encampment Represents First Major Test for Harvard President Alan Garber

News

Israeli PM Benjamin Netanyahu Condemns Antisemitism at U.S. Colleges Amid Encampment at Harvard

News

‘A Joke’: Nikole Hannah-Jones Says Harvard Should Spend More on Legacy of Slavery Initiative

News

Massachusetts ACLU Demands Harvard Reinstate PSC in Letter

News

LIVE UPDATES: Pro-Palestine Protesters Begin Encampment in Harvard Yard

Police, B-School Review Computer Security Plan

Report is Part of Increasing Computerization

By Christopher J. Georges

In response to recent computer thefts, Harvard is examining possible new security measures. University officials consider the review a critical part of Harvard's increasing computerization.

The first product of the review is the Harvard Police Department's examination of security systems designed specifically for computers at other universities across the country.

The report, compiled for the Business School, where there have been three computer thefts in the past year, is also a "preventive measure for handling the increasing number of personal computers here," said Paul H. Lapointe, assistant dean at the B-School.

Theft of computer equipment at Harvard has become what officials describe as a "major problem" but note that it is usually limited to portable equipment.

The security review is important because Harvard is planning to modernize significantly its computer facilities and several multi-million-dollar purchases are under negotiation.

The purchases will mark a major step in what officials describe as Harvard's expected efforts to establish a decentralized computer network with work stations or personal computers spread throughout the campus.

An Ongoing Process

The approximately 50-page police report, compiled earlier this month, is part of the "on-going process of stepping up security measures for computers throughout the University," said Deputy Harvard Police Chief Jack W. Morse.

He added that the police department is also working with the Faculty of Arts and Sciences as well as other areas of the University to prevent theft.

Computer theft is a predictable and growing problem. Morse said, explaining that the department is taking "preventive measures to lock the barn door before the horse gets out."

The report examined the B-School "simply because they have a lot more computers than most other areas [in the University]," Morse said.

There are approximately 150 personal computers at the B-School, and administrators are currently looking into an extensive expansive of the school's facilities, Lapointe said, adding, "We have to be sure to get the right amount of security as well as insurance."

The report examines security measures such as bolting personal computers to desk tops, alarms, and systems that can detect movement of if the computer is unplugged, said Lapointe. "We might have a key or card access system, but these might seriously interfere with the way we do things around here," Lapointe said.

Lapointe said plans were moving quickly to prepare for future problems and not only as a result of a few bad experiences. "We don't want to make the place look like Alcatraz, but we have to prevent these machines from being lost, stolen, or carted out of our buildings," he explained.

The first moves should come within a month and these will probably designed to obtain "better insurance coverage," Lapointe said.

"In the future, our security responsibilities will depend on how many--and what type of--computers we will have here," he said.

While other reports have not yet been completed, security measures in other areas of the University may not be the same as those necessary at the B-School, said Guy J Giannaiver, associate director of the Office for Information Technology.

He singled out the Science Center as a place where stiller security would probably be necessary.

"The Science Center is more open and you have a wider variety of people coming through, so it is difficult to suspect who belongs there and who doesn't," he said.

Such factors as "traffic flow," "public access" and the "value of the equipment" all play important roles in determining security procedures, he added.

Want to keep up with breaking news? Subscribe to our email newsletter.

Tags