IVYSEC Charter & Bylaws

Last Updated: April 21, 2025

IVYSEC is a collective of student-led organizations from Ivy League institutions dedicated to advancing cybersecurity education, research, collaboration, and community engagement. It exists not as a brand or governing body, but as a unifying platform for coordination and partnership across independent cybersecurity-focused groups.

Article I: Nature of the Collective

  1. Definition: IVYSEC is a non-governing collective, not a legal entity, brand, or corporate structure. It does not seek to subsume, control, or rebrand any member organization.

  2. Autonomy: All member organizations retain full independence. IVYSEC does not impose directives, enforce curriculum, or mandate participation in any activities.

  3. Scope: IVYSEC facilitates intercollegiate collaboration through events, communication channels, shared educational initiatives, competitions, and rotating security conferences.

Article II: Membership

  1. Eligibility: Any student-led organization operating within an Ivy League university may seek membership in IVYSEC, provided their focus includes any of the following:

    • Cybersecurity

    • Cyber policy

    • Ethical hacking

    • Information security

    • Cryptography

    • Digital forensics

    • Privacy, trust, or cyber law

    • Security research

  2. Institutional Membership Flexibility: IVYSEC permits multiple member organizations from the same university. Membership is not limited to one club per institution.

  3. Application & Admission:

    • Interested organizations submit a brief statement of intent and overview of their mission.

    • Existing members conduct a majority vote to approve new members.

    • New members may begin participating immediately upon approval.

  4. Voluntary Membership: Organizations may enter or leave IVYSEC at any time. Withdrawal requires written notice but no vote.

Article III: Governance & Decision-Making

  1. Decentralization: IVYSEC operates on consensus or simple majority among currently active members. There is no central governing board.

  2. Point of Contact: Each organization must designate a primary point of contact (IVYSEC Representative) for communication purposes.

  3. Support Structures: Member organizations are permitted—and encouraged—to create internal support structures under their designated IVYSEC Representative. This can include teams or subcommittees that assist in coordinating IVYSEC-related activities, planning travel logistics, managing communication, or developing educational content. The internal structure and delegation of responsibilities are at the discretion of each member organization.

  4. Voting Process:

    • Each member organization holds one vote.

    • Decisions regarding conference hosting, new initiatives, or structural adjustments must be proposed and discussed via IVYSEC’s shared communication platform.

Article IV: Participation & Expectations

  1. Collaboration: Members are encouraged (not required) to:

    • Co-host events, workshops, or panels

    • Share educational resources and documentation

    • Invite peers to university-specific events

    • Contribute to intercollegiate Capture-the-Flag (CTF) competitions

  2. Engagement: Members should maintain regular communication and respond to collective proposals or updates.

  3. Representation: When representing IVYSEC externally (e.g., in public materials or outreach), members must clearly distinguish between their organization and the IVYSEC collective.

Article V: Events & Initiatives

  1. Annual Conference: IVYSEC aspires to host an annual security conference rotating among Ivy League campuses. Hosting responsibilities are voluntary and proposed by member organizations.

  2. Working Groups: Temporary or long-term working groups may be formed around topics of interest such as curriculum building, research publication, or outreach.

  3. Shared Infrastructure: IVYSEC may maintain shared digital infrastructure (e.g., website, resource hub, mailing list) hosted by volunteers from within the network.

Article VI: Amendments

  1. Proposal Process: Any member organization may propose amendments to this document.

  2. Approval: Amendments require a two-thirds majority vote by all active member organizations.

  3. Review: This document should be reviewed annually to reflect the evolving needs and values of the collective.

IVYSEC is built on mutual respect, decentralized leadership, and a shared commitment to advancing cybersecurity within the academic environment. This document serves to clarify its operational ethos, protect member autonomy, and ensure continued collaboration among passionate student organizations.