EDUCAUSE | Identity and Access Management http://www.educause.edu/Resources/Browse/IdentityandAccessManagement/17322 en EDUCAUSE | Identity and Access Management http://www.educause.edu/Resources/Browse/IdentityandAccessManagement/17322 http://www.educause.edu/sites/all/themes/educause/images/e_rss.png Fed. Regs. on Student Identity Verification, State Authorization of Distance Ed. Back on the Radar http://www.educause.edu/blogs/jcummings/fed-regs-student-identity-verification-state-authorization-distance-ed-back-radar <p>As <a href="http://www.insidehighered.com/news/2013/04/16/us-announces-rulemaking-gainful-employment-state-authorization-and-long-term-agenda">reported </a>in today&#39;s&#160;<em>Inside Higher Ed</em>, the U.S. Department of Education (ED) has announced its intent to modify <a href="https://www.federalregister.gov/articles/2012/05/01/2012-10488/negotiated-rulemaking-committee-public-hearings">the rule-making effort</a><span style="line-height: 1.4em;">&#160;it originally proposed last year&#160;</span><span style="line-height: 1.4em;">to address federal student aid fraud concerns.</span></p><p><a href="http://www.educause.edu/blogs/jcummings/fed-regs-student-identity-verification-state-authorization-distance-ed-back-radar" target="_blank">read more</a></p> Tue, 16 Apr 2013 21:13:20 +0000 286316 at http://www.educause.edu Call for Participation: The Multi-Factor Authentication Cohortium http://www.educause.edu/blogs/vvogel/call-participation-multi-factor-authentication-cohortium <p>The <a href="https://spaces.internet2.edu/display/scalepriv/Scalable+Privacy">Internet2 Scalable Privacy Project (ScalePriv)</a>, funded with the recent National Strategy for Trusted Identities in Cyberspace (NSTIC) grant to <a href="http://www.internet2.edu">Internet2</a>, is seeking campuses to participate in the Multi-Factor Authentication (MFA) Cohortium*. Applications are open until April 26, 2013 (<em>note the deadline extension</em>).</p><p><a href="http://www.educause.edu/blogs/vvogel/call-participation-multi-factor-authentication-cohortium" target="_blank">read more</a></p> Wed, 20 Mar 2013 15:49:09 +0000 284860 at http://www.educause.edu The Wild-Card Character of "Bring Your Own": A Panel Discussion http://www.educause.edu/ero/article/wild-card-character-bring-your-own-panel-discussion <p><span id="internal-source-marker_0.08901432150567357" style="font-size:15px;font-family:'Times New Roman';color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Panelists on the front lines of higher education information technology share their thoughts on BYOD and what it could mean for colleges and universities.</span></p><p><a href="http://www.educause.edu/ero/article/wild-card-character-bring-your-own-panel-discussion" target="_blank">read more</a></p> Tue, 12 Mar 2013 17:36:16 +0000 283901 at http://www.educause.edu An Incremental Approach to Building an Information Security Program http://www.educause.edu/ero/article/incremental-approach-building-information-security-program <ul> <li><strong>Constraints</strong> such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security <strong>pose challenges</strong> for higher education IT organizations wanting to establish <strong>a comprehensive information security program</strong>.</li> <li>An <strong>iterative approach</strong> to a security program takes advantage of <strong>regular audits</strong> to find problems and <strong>address them</strong> <strong>according to risk and priority</strong> of each lapse identified.</li> <li>The IT organization&#8217;s security program <strong>gets stronger with every audit cycle</strong>, and the approach provides a good basis for <strong>comparing past performance and measuring progress</strong>.</li></ul><p><a href="http://www.educause.edu/ero/article/incremental-approach-building-information-security-program" target="_blank">read more</a></p> Tue, 05 Mar 2013 20:59:20 +0000 283560 at http://www.educause.edu NSTIC Pilots at RSA Features Internet2 Scalable Privacy Project http://www.educause.edu/blogs/rodney/nstic-pilots-rsa-features-internet2-scalable-privacy-project <p>The following announcement from the National Institute of Standards and Technology (NIST) concerns the pilots funded as part of the President&#39;s National Strategy for Trusted Identities in Cyberspace (NSTIC).&#160; Among the funded pilots that will be featured at <a href="http://rsaconference.com/">RSA Conference</a> is the Internet2 Piloting Mobile Device Multifactor Authentication on University Campuses.&#160; For more information about the Internet2 Scalable Privacy Pilot, see <a href="https://spaces.internet2.edu/display/scalepriv/Scalable+Privacy">https://spaces.internet2.edu/display/scalepriv/Scalable+Privacy</a></p><p><strong>Beyond User Names and Passwords: Meet the NSTIC Pilots at RSA</strong></p><p><a href="http://www.educause.edu/blogs/rodney/nstic-pilots-rsa-features-internet2-scalable-privacy-project" target="_blank">read more</a></p> Wed, 27 Feb 2013 14:01:28 +0000 283195 at http://www.educause.edu Top Information Security Concerns for Researchers http://www.educause.edu/blogs/vvogel/top-information-security-concerns-researchers <p>Communicating information security issues with campus researchers is a common challenge in the higher education community. Often, researchers may not see information security or data protection as their concern. A new HEISC resource, <a href="https://wiki.internet2.edu/confluence/display/itsg2/Top+Information+Security+Concerns+for+Researchers">Top Information Security Concerns for Researchers: Protecting Your Intellectual Assets</a>, provides 10 sets of questions for researchers to consider about their data while also offering relevant resources for protecting that research data.</p><p>Questions or comments about this resource? Please contact us: <a href="mailto:security-council@educause.edu">security-council@educause.edu</a>.</p><p><a href="http://www.educause.edu/blogs/vvogel/top-information-security-concerns-researchers" target="_blank">read more</a></p> Tue, 12 Feb 2013 17:08:56 +0000 282422 at http://www.educause.edu ED CPO on Privacy, Emerging Technologies, and New Uses of Data http://www.educause.edu/blogs/kathleen-styles/ed-cpo-privacy-emerging-technologies-and-new-uses-data <p>When I first accepted the position as ED&#8217;s Chief Privacy Officer the workload revolved heavily around privacy issues in the K-12 context, especially issues relating the Family Educational Rights Privacy Act (FERPA) and its applicability to State Longitudinal Databases. Recently our office is spending an increasing amount of time providing guidance in the higher ed arena. Colleges, universities, and other postsecondary institutions often have research agendas that involve data; they often have medical facilities; and most importantly, colleges and universities often function as change agents, particularly for technological and social change. The combination of new technologies and new uses of data create today&#8217;s cutting-edge privacy issues, including &#8220;Big Data,&#8221; matching with wage data, data sharing in general, the use of analytics, cloud computing, MOOCs, and school use of web engagement tools.</p><p><a href="http://www.educause.edu/blogs/kathleen-styles/ed-cpo-privacy-emerging-technologies-and-new-uses-data" target="_blank">read more</a></p> Mon, 28 Jan 2013 20:26:33 +0000 281147 at http://www.educause.edu A Few Things about E-FERPA http://www.educause.edu/blogs/smcdonal/few-things-about-e-ferpa <p>Probably no statute affects higher education more, but is understood less, than the Family Educational and Privacy Rights Act, or &#8220;FERPA,&#8221; the primary federal law that regulates how we handle our records about our students. And that is no doubt especially true when it comes to electronic records (which for some reason seem to baffle us in almost every context). Data Privacy Month seems a good time to clear up some of the most common misunderstandings:</p><p><strong>1. FERPA makes no distinction between electronic and other records.</strong> FERPA governs <em>all</em> records that we maintain about our students, be they written on paper; captured in film, photographs, or audiotape; made up solely of electrons; or, for that matter, carved into stone tablets, and it governs them in <em>exactly</em> the same way. At least for purposes of FERPA, the medium is <em>not</em> the message.</p><p><a href="http://www.educause.edu/blogs/smcdonal/few-things-about-e-ferpa" target="_blank">read more</a></p> Mon, 28 Jan 2013 16:34:17 +0000 281099 at http://www.educause.edu Higher Education Activities during Data Privacy Month http://www.educause.edu/blogs/vvogel/higher-education-activities-during-data-privacy-month <p>Although this is only the second year that colleges and universities are working together to observe and promote <a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/educause-policy/community-engagement/data-privacy-month">Data Privacy Month</a>, many campuses are busy planning local or regional events, tweeting daily with the hashtags <a href="https://twitter.com/search?q=%23dataprivacy">#dataprivacy</a> and <a href="https://twitter.com/search?q=%23dpd13">#dpd13</a>, and writing blogs or articles about data privacy. We hope these activities will encourage you to consider ways to promote Data Privacy Month this year or begin thinking about how yor campus will participate in 2014.</p><p><a href="http://www.educause.edu/blogs/vvogel/higher-education-activities-during-data-privacy-month" target="_blank">read more</a></p> Fri, 18 Jan 2013 22:31:21 +0000 280532 at http://www.educause.edu January 28th is Data Privacy Day–Respecting Privacy, Safeguarding Data and Enabling Trust http://www.educause.edu/blogs/aimeemlk/january-28th-data-privacy-day%E2%80%93respecting-privacy-safeguarding-data-and-enabling-trust <p>As the <a href="http://www.staysafeonline.org/">National Cyber Security Alliance (NCSA)</a>, we have the honor of coordinating <a href="http://www.staysafeonline.org/data-privacy-day/">Data Privacy Day (DPD)</a>. Data Privacy Day is held on January 28th annually and is an effort to empower people to protect their privacy, control their digital footprint, and escalate the protection of privacy and data as everyone&#8217;s priority. The success of Data Privacy Day relies on everyone, including our trusted partners such as EDUCAUSE and the higher education community, to educate and create awareness about the importance of data privacy.</p><p><a href="http://www.educause.edu/blogs/aimeemlk/january-28th-data-privacy-day%E2%80%93respecting-privacy-safeguarding-data-and-enabling-trust" target="_blank">read more</a></p> Fri, 18 Jan 2013 21:57:21 +0000 280509 at http://www.educause.edu Lance Spitzner on Data Privacy Awareness http://www.educause.edu/blogs/lspitzner/lance-spitzner-data-privacy-awareness <p>A common challenge many schools share is protecting the privacy of their students. Institutions maintain a surprising amount of highly confidential student information including medical, financial, personal, and educational data. As a result, institutions have to comply with numerous regulations including HIPAA, FERPA, or GLBA. Remembering all of these different compliance rules and regulations can be confusing or overwhelming for faculty and staff. However, if you take a step back, many of these regulations have the same goal&#8211;protection of private information. In addition, the steps people are expected to follow in order to protect data are often the same.</p><p><a href="http://www.educause.edu/blogs/lspitzner/lance-spitzner-data-privacy-awareness" target="_blank">read more</a></p> Fri, 18 Jan 2013 16:55:14 +0000 280428 at http://www.educause.edu Leadership Discussion: Identity and Access Management in Higher Education http://www.educause.edu/southeast-regional-conference/2013/leadership-discussion-identity-and-access-management-higher-education Has your campus established an enterprise strategy for identity and access management? Does your IAM architecture facilitate easy migration to the cloud? Is your IAM system standards-based and interoperable with other identity providers and service providers? Are you prepared to federate with other institutions of higher education, the federal government, and the private sector? Are you working toward InCommon Silver certification? This discussion session is designed to bring together CIOs, IT directors, IT architects, managers, and other leaders responsible for IAM to discuss effective practices and solutions, current challenges, and future opportunities.<p><a href="http://www.educause.edu/southeast-regional-conference/2013/leadership-discussion-identity-and-access-management-higher-education" target="_blank">read more</a></p> Fri, 11 Jan 2013 22:30:08 +0000 279856 at http://www.educause.edu Navigating the Clouds with an Enterprise IT Strategy http://www.educause.edu/events/enterprise-it-leadership-conference/2013/navigating-clouds-enterprise-it-strategy <p>Should your institution be a cloud services leader? How do you balance the risks of innovation with the possible benefits? What about managing identity in the cloud? Furman University&#39;s IT Strategic Plan is guiding an aggressive move to cloud services. This session will look at lessons learned, opportunities, and challenges ahead. An enterprise IT strategy can guide strategic innovations using cloud services for your institution. We will discuss the forces that drove us at Furman University to pursue cloud solutions and cloud service models, as well as how identity management tied everything together. The lessons we&#39;ve learned can help your institution&#39;s planning efforts for cloud services.</p><p><a href="http://www.educause.edu/events/enterprise-it-leadership-conference/2013/navigating-clouds-enterprise-it-strategy" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:41:55 +0000 278907 at http://www.educause.edu January 2013 is Data Privacy Month! Free Webinars and Easy Ways to Increase Awareness http://www.educause.edu/blogs/vvogel/january-2013-data-privacy-month-free-webinars-and-easy-ways-increase-awareness <p><a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/educause-policy/community-engagement/data-privacy-month">Data Privacy Month</a> is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone&#39;s priority. Spend the month helping to ensure your campus community is respecting privacy, safeguarding data, and enabling trust. This year&#8217;s Data Privacy Month Planning Task Force has selected weekly themes for the higher education community to focus on. Several free webinars will also be offered throughout the month of January.</p><p><a href="http://www.educause.edu/blogs/vvogel/january-2013-data-privacy-month-free-webinars-and-easy-ways-increase-awareness" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/PrivacyTower2.jpg">PrivacyTower2.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/PrivacyHero2.jpg">PrivacyHero2.jpg</a></fieldset> Fri, 21 Dec 2012 19:05:38 +0000 278613 at http://www.educause.edu Security and Privacy Sessions at EDUCAUSE 2012 http://www.educause.edu/blogs/vvogel/security-and-privacy-sessions-educause-2012 <p>The <a href="http://www.educause.edu/annual-conference/2012">annual EDUCAUSE Conference</a> (November 6-9) offers a variety of <a href="http://www.educause.edu/annual-conference/agenda-and-program/search?filters=tid%3A44961">security and privacy-related sessions</a>. Whether you plan to join us in Denver or participate online, we encourage you to attend as many of these presentations as possible. Also remember to mark your calendar for the upcoming <a href="http://www.educause.edu/events/security-professionals-conference">Security Professionals Conference</a>, which will be held April 15-17, 2013 in St. Louis, Missouri, and Online. A <a href="http://www.educause.edu/events/security-professionals-conference/call-proposals">Call for Proposals </a>is currently out, with a November 13, 2012 deadline.</p><h4><em><strong>Tuesday, November 6, 2012</strong></em></h4><p><strong>Preconference Seminars (<em>separate registration required</em>)</strong></p><p><a href="http://www.educause.edu/blogs/vvogel/security-and-privacy-sessions-educause-2012" target="_blank">read more</a></p> Tue, 16 Oct 2012 19:47:48 +0000 273154 at http://www.educause.edu Cloud Security Awareness http://www.educause.edu/blogs/lspitzner/cloud-security-awareness <p>Cloud computing is similar to the Bring Your Own Device (BYOD) syndrome. You can fight it all you want, but sooner or later your organization will most likely have to accept it. A common failure with securing the Cloud is that most organizations focus on only the technical controls, such as where is the data stored or when and how is the data encrypted. However, you must also train and educate the very people using this technology or you can expose your organization to tremendous risk. Technical controls can only do so much. The following are some of the key awareness points to consider.</p><p><strong>1. What Is The Cloud?</strong></p><p>First, don&#39;t assume everyone in your organization knows or understands what the Cloud is. Before you start explaining policies for Cloud, explain what it is and how it works. Consider including examples; people may not realize that Google Docs or Dropbox is the Cloud.</p><p><strong>2. Is The Cloud Allowed?</strong></p><p><a href="http://www.educause.edu/blogs/lspitzner/cloud-security-awareness" target="_blank">read more</a></p> Thu, 11 Oct 2012 16:05:00 +0000 272676 at http://www.educause.edu Identity and Access Management Topics at EDUCAUSE 2012 http://www.educause.edu/blogs/rodney/identity-and-access-management-topics-educause-2012 <p>The <a href="http://www.educause.edu/www.nist.gov/stick">National Strategy for Trusted Identities in Cyberspace (NSTIC)</a> has certainly brought to light the importance of an international dialogue about the role of <a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/identity-and-access-management">identity and access management (IAM)</a> in helping to enable online services and improve cybersecurity. At the campus level, there is a need for an enterprise strategy on IAM to enable single sign-on, authenticate users, limit access to authorized individuals, and federate with other service providers. Movement away from on-campus systems to externally hosted systems and cloud providers make the need for robust identity management even more important.</p><p>The <a href="http://www.educause.edu/annual-conference/2012">annual EDUCAUSE Conference in Denver</a> will provide an opportunity to explore the range and depth of issues that campuses must consider as they build their enterprise IAM strategy.&#160; Below are the sessions that we would encourage you to attend.</p><p><a href="http://www.educause.edu/blogs/rodney/identity-and-access-management-topics-educause-2012" target="_blank">read more</a></p> Tue, 09 Oct 2012 20:01:32 +0000 272426 at http://www.educause.edu National Cyber Security Awareness Month 2012 is HERE! http://www.educause.edu/blogs/vvogel/national-cyber-security-awareness-month-2012-here <p><em><strong>It&#8217;s that time of year again! October is National Cyber Security Awareness Month.</strong></em></p><p>Help us raise awareness with your faculty, staff, and students this October by promoting National Cyber Security Awareness Month (NCSAM).</p><p>We will start the month off with an EDUCAUSE Live! webinar on <strong>October 4</strong> (1-2 pm EDT). Register <a href="http://www.educause.edu/events/educause-live-security-awareness-and-communication-c-suite">here</a> and join Dave Cullinane, Chief Information Security Officer at eBay (retired) and Co-Founder of the Cloud Security Alliance, as he discusses &#8220;<a href="http://www.educause.edu/events/educause-live-security-awareness-and-communication-c-suite">Security Awareness and Communication in the C-Suite</a>.&#8221;</p><p>If you plan on holding an event in October, please share your plans and any applicable URL&#8217;s with this group or send an e-mail to <a href="mailto:security-council@educause.edu">security-council@educause.edu</a> so your institution&#39;s activities can be included with our list of 2012 campus events.</p><p><a href="http://www.educause.edu/blogs/vvogel/national-cyber-security-awareness-month-2012-here" target="_blank">read more</a></p> Mon, 01 Oct 2012 18:52:25 +0000 271438 at http://www.educause.edu More financial aid fraud rings targeting online learning busted http://www.educause.edu/blogs/jcummings/more-financial-aid-fraud-rings-targeting-online-learning-busted <p>As reported in <em><a href="http://www.insidehighered.com/quicktakes/2012/09/19/us-indicts-21-student-aid-fraud-rings">Inside Higher Ed</a></em>, the U.S. Department of Education (ED) Office of the Inspector General (OIG) and the U.S. Attorney for the Eastern District of California <a href="http://www2.ed.gov/about/offices/list/oig/invtreports/ca092012.pdf">announced</a> yesterday the indictment of 21 people in California who were involved in financial aid fraud rings targeting online learning programs at community colleges and low-cost for-profit institutions. (You can access the PDF file of the press release <a href="http://www.educause.edu/sites/default/files/ED%20OIG%20PR%20FA%20Fraud%20Cases%2009-18-12.pdf">here</a>.) Collectively, the accused allegedly obtained over $770,000 using other individuals&#8217; identities, whether freely supplied by co-conspirators or stolen, to fraudulently register for admissions and financial aid.</p><p><a href="http://www.educause.edu/blogs/jcummings/more-financial-aid-fraud-rings-targeting-online-learning-busted" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-application-pdf"><img class="field-icon-application-pdf" alt="application/pdf icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/application-pdf.png" /></div> <a href="http://www.educause.edu/sites/default/files/ED%20OIG%20PR%20FA%20Fraud%20Cases%2009-18-12.pdf">ED OIG PR FA Fraud Cases 09-18-12.pdf</a></fieldset> Wed, 19 Sep 2012 16:41:42 +0000 270155 at http://www.educause.edu Preparing for Back-to-School BYOD http://www.educause.edu/library/resources/preparing-back-school-byod <p>With the BYOD trend on campus growing ever stronger, an IT network analyst shares his checklist to help ensure that your campus network is ready to manage the onslaught.</p><p><a href="http://www.educause.edu/library/resources/preparing-back-school-byod" target="_blank">read more</a></p> Wed, 08 Aug 2012 16:51:48 +0000 267391 at http://www.educause.edu Can Big Data Help Universities Tackle Security, BYOD? http://www.educause.edu/library/resources/can-big-data-help-universities-tackle-security-byod <p class="description">Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can&#39;t escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing.</p><p><a href="http://www.educause.edu/library/resources/can-big-data-help-universities-tackle-security-byod" target="_blank">read more</a></p> Tue, 07 Aug 2012 19:35:10 +0000 267319 at http://www.educause.edu Security Professionals Conference 2012 Recap http://www.educause.edu/blogs/vvogel/security-professionals-conference-2012-recap <p><img alt="10th anniversary Security Conference cake" src="http://www.educause.edu/visuals/shared/HEISC/SEC12%20anniv%20cake%20sm2.jpg" style="width: 160px; height: 96px; float: left;" />Security and IT professionals from the higher education community gathered to celebrate the 10th anniversary of the <a href="http://www.educause.edu/events/security-professionals-conference/2012">Security Professionals Conference</a> in Indianapolis, May 15-17, 2012. This year&#39;s face-to-face event had a record-breaking 438 attendees (an increase of almost 100 participants from the 2011 conference in San Antonio). The online security conference, offered for the second year in a row, was a great success with over 100 registered attendees (estimated exposure to the full online event was approximately 250 participants).</p><p><a href="http://www.educause.edu/blogs/vvogel/security-professionals-conference-2012-recap" target="_blank">read more</a></p> Thu, 07 Jun 2012 21:47:49 +0000 262206 at http://www.educause.edu Building a 21st Century Digital Government http://www.educause.edu/blogs/rodney/building-21st-century-digital-government <p> President Obama has issued a directive entitled <a href="http://www.gpo.gov/fdsys/pkg/FR-2012-06-01/pdf/2012-13470.pdf">&ldquo;Building a 21<sup>st</sup> Century Digital Government&rdquo;</a> that launches a comprehensive Digital Government Strategy.&nbsp; According to the directive:</p><blockquote> <p> The innovative use of technology is fundamentally transforming how the American people do business and live their daily lives.&nbsp; Exponential increases in computing power, the rise of high-speed networks, and the growing mobile revolution have put the Internet at our fingertips, encouraging innovations that are giving rise to new industries and reshaping existing ones . . . However, it is time for the Federal Government to do more . . . at a time when Americans increasingly pay bills and buy tickets on mobile devices, Government services often are not optimized for smartphones or tablets, assuming the services even available online. </p></blockquote><p><a href="http://www.educause.edu/blogs/rodney/building-21st-century-digital-government" target="_blank">read more</a></p> Mon, 04 Jun 2012 19:20:15 +0000 259138 at http://www.educause.edu Software-as-a-Service Email Security: Risk vs. Trust http://www.educause.edu/library/resources/software-service-email-security-risk-vs-trust <p>Many organizations would be interested in treating<strong> e-mail as a commodity</strong>&#8212;cutting costs and resource investments by<strong> outsourcing it to a software as a service (SaaS) </strong>provider. However, <strong>e-mail is a primary enterprise communication channel</strong> and often<strong> contains sensitive, proprietary content </strong>that needs to be protected. A significant amount of an enterprise&#39;s intellectual property is likely to be in the e-mail system&#39;s databases. Therefore, outsourcing e-mail to a third party raises important concerns about <strong>security and the risks associated with such an arrangement.</strong> This assessment provides enterprises with a framework to address these issues.</p><p><em>Citation for this Work</em>: Gartner, Inc., <em>Software-as-a-Service Email Security: Risk vs. Trust</em>, by Bill Pray, Dan Blum, 27 March 2012.</p><p><strong>ECAR Subscribers &#8212; You must be logged in to the EDUCAUSE website to access Gartner resources.</strong></p><p>Access to the report expires on May 9, 2013.</p><p><a href="http://www.educause.edu/library/resources/software-service-email-security-risk-vs-trust" target="_blank">read more</a></p> Tue, 29 May 2012 15:00:59 +0000 258278 at http://www.educause.edu May 9 IAM Online: Emerging Legal Framework for IAM http://www.educause.edu/blogs/vvogel/may-9-iam-online-emerging-legal-framework-iam <p> Tune in to the next IAM Online, <strong>Wednesday, May 9, 2012</strong>, at <strong>3 p.m. ET</strong>, to learn more about &quot;<strong><a href="http://www.incommon.org/iamonline/">The Emerging Legal Framework for Identity and Access Management</a></strong>&quot; with speaker <strong>Tom Smedinghoff</strong> (Edwards Wildman Palmer LLP) and moderator Chris Holmes (Baylor University). For more details, or to access archived sessions, visit <a href="http://www.incommon.org/iamonline">http://www.incommon.org/iamonline</a>.</p><p><a href="http://www.educause.edu/blogs/vvogel/may-9-iam-online-emerging-legal-framework-iam" target="_blank">read more</a></p> Mon, 30 Apr 2012 15:49:13 +0000 252594 at http://www.educause.edu