L2/07-282

SBP/07-003

in071207

INCITS
InterNational Committee for Information Technology Standards

INCITS Secretariat, Information Technology Industry Council (ITI)
1250 Eye St. NW, Suite 200, Washington, DC 20005
Telephone 202-737-8888; Fax 202-638-4922

 

Date: August 6, 2007
Reply to: Jennifer Garner
Phone: (202) 626-5737
Email:
jgarner@itic.org



Subject: Notification of Establishment, Call for Participants and Meeting Announcement - INCITS Study Group on Security Best Practices - September 19, 2007 Formation Meeting - Scottsdale, AZ



Notification of Establishment

At the July 2007 meeting of the INCITS Executive Board, the INCITS Study Group on Security Best Practices was established with the following charter:
The INCITS Study Group on Security Best Practices will:
Mr. Edward Stull, sponsored by Direct Computer Resources, Inc., will serve as the Chairman of the INCITS Study Group on Security Best Practices. 


Formation Meeting


The formation meeting of the INCITS Study Group on Security Best Practices will be held September 19, 2007 from 3:00 PM to 4:30 PM in conjunction with the Financial Services Technology (FST) Summit at The Boulders Resort in Arizona:
The Boulders Resort and Golden Door Spa
(meeting room information – see hotel meeting board)
34631 North Tom Darlington Drive
Carefree, Arizona 85377
Telephone:    866-397-6520      
http://www.theboulders.com/
The dress code for this meeting is casual dress suitable for business discussion.

Please RSVP to Jennifer Garner (jgarner@itic.org) by September 14, 2007.


Call for Participants


Interested parties are invited to nominate representatives to the INCITS Study Group on Security Best Practices.  Although participants may join the Study Group at any time, requests to establish membership are requested by September 14, 2007 to assist in planning for the formation meeting and should be submitted to the INCITS Secretariat (jgarner@itic.org).  All attendees at the formation meeting shall be considered voting members of the INCITS Study Group on Security Best Practices unless they have requested advisory (non-voting) membership.

Membership is open to all directly and materially affected parties that meet attendance and voting requirements and pay the designated service fees.