EDUCAUSE | Data Security http://www.educause.edu/Resources/Browse/DataSecurity/30438 en EDUCAUSE | Data Security http://www.educause.edu/Resources/Browse/DataSecurity/30438 http://www.educause.edu/sites/all/themes/educause/images/e_rss.png Cloud Computing in Education http://www.educause.edu/library/resources/cloud-computing-education <p>This video, produced by <a href="http://teachprivacy.com" target="_blank">TeachPrivacy</a>, discusses the benefits and risks of educational institutions using cloud computing providers. Advice is provided for how educational institutions should choose cloud providers, establish a relationship with them, and maintain that relationship with the appropriate protections for privacy and data security.</p><p>&#160;</p><p><iframe allowfullscreen="" frameborder="0" height="360" src="http://www.youtube.com/embed/q9Mu1INm6KA?feature=player_embedded" width="640"></iframe></p><p>&#160;</p><p><a href="http://www.educause.edu/library/resources/cloud-computing-education" target="_blank">read more</a></p> Tue, 12 Mar 2013 22:09:43 +0000 283940 at http://www.educause.edu The Wild-Card Character of "Bring Your Own": A Panel Discussion http://www.educause.edu/ero/article/wild-card-character-bring-your-own-panel-discussion <p><span id="internal-source-marker_0.08901432150567357" style="font-size:15px;font-family:'Times New Roman';color:#000000;background-color:transparent;font-weight:normal;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;">Panelists on the front lines of higher education information technology share their thoughts on BYOD and what it could mean for colleges and universities.</span></p><p><a href="http://www.educause.edu/ero/article/wild-card-character-bring-your-own-panel-discussion" target="_blank">read more</a></p> Tue, 12 Mar 2013 17:36:16 +0000 283901 at http://www.educause.edu Privacy and Security Initiatives and Recommendations from the U.S. Department of Education http://www.educause.edu/ero/article/privacy-and-security-initiatives-and-recommendations-us-department-education <ul> <li>At EDUCAUSE 2012, <strong>U.S. Department of Education</strong> speakers discussed new privacy and security initiatives, as well as offering recommendations on <strong>navigating privacy efforts </strong>and <strong>preparing for and managing security breaches</strong>.</li> <li>Many of the new <strong>amendments to FERPA exceptions </strong>were developed in order to <strong>improve accountability in data sharing</strong>.</li> <li>At the heart of <strong>breach prevention and response</strong> are solid, <strong>established processes</strong> and <strong>targeted oversight</strong>.</li></ul><p><a href="http://www.educause.edu/ero/article/privacy-and-security-initiatives-and-recommendations-us-department-education" target="_blank">read more</a></p> Wed, 13 Feb 2013 20:53:58 +0000 282510 at http://www.educause.edu Top Information Security Concerns for Researchers http://www.educause.edu/blogs/vvogel/top-information-security-concerns-researchers <p>Communicating information security issues with campus researchers is a common challenge in the higher education community. Often, researchers may not see information security or data protection as their concern. A new HEISC resource, <a href="https://wiki.internet2.edu/confluence/display/itsg2/Top+Information+Security+Concerns+for+Researchers">Top Information Security Concerns for Researchers: Protecting Your Intellectual Assets</a>, provides 10 sets of questions for researchers to consider about their data while also offering relevant resources for protecting that research data.</p><p>Questions or comments about this resource? Please contact us: <a href="mailto:security-council@educause.edu">security-council@educause.edu</a>.</p><p><a href="http://www.educause.edu/blogs/vvogel/top-information-security-concerns-researchers" target="_blank">read more</a></p> Tue, 12 Feb 2013 17:08:56 +0000 282422 at http://www.educause.edu Data Privacy Day 2013 Event http://www.educause.edu/blogs/cheverij/data-privacy-day-2013-event <p>The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused on helping all digital citizens stay safer and more secure online, kicked off Data Privacy Day 2013 with a forum at the George Washington University Law School, along with Federal Trade Commissioner Maureen Ohlhausen and other privacy and security experts from AT&#38;T, Facebook, Intel, MasterCard, Microsoft and the federal government.&#160; The theme of the event was &#34;Respecting Privacy, Safeguarding Data, and Enabling Trust.&#34;&#160; The forum explored a wide range of issues including respecting privacy, safeguarding data, privacy innovation, and the implications for personal information in the digital age and the mobile environment.</p><p><a href="http://www.educause.edu/blogs/cheverij/data-privacy-day-2013-event" target="_blank">read more</a></p> Tue, 29 Jan 2013 01:43:35 +0000 281172 at http://www.educause.edu Writing a Data Management Plan http://www.educause.edu/library/resources/writing-data-management-plan <p>The University of Colorado at Boulder Libraries has created a useful page to assist in writing data management plans, which are now requried by funding agencies and are part of the grant application process.</p><p>&#160;</p><p><a href="http://www.educause.edu/library/resources/writing-data-management-plan" target="_blank">read more</a></p> Fri, 25 Jan 2013 22:50:56 +0000 281076 at http://www.educause.edu Managing Risk and Compliance by Implementing DLP to Ensure Data Security http://www.educause.edu/events/security-professionals-conference/2013/managing-risk-and-compliance-implementing-dlp-ensure-data-security Did a university e-mail contain employee PII data? Did we just FTP a file that contains alumni PCI data? In this seminar, you will learn how Saint Louis University increased its ability to prevent the loss of restricted, sensitive, and confidential data. Hear the university's strategy to use DLP to elevate compliance and win grants. Detection of data loss is the first step in preventing loss. In this session, we will discuss simple means to mitigate the risk and exposure of the data-loss problem.<p><a href="http://www.educause.edu/events/security-professionals-conference/2013/managing-risk-and-compliance-implementing-dlp-ensure-data-security" target="_blank">read more</a></p> Fri, 18 Jan 2013 23:30:07 +0000 280550 at http://www.educause.edu Data Privacy Month Awareness Video, 2013 http://www.educause.edu/library/resources/data-privacy-month-awareness-video-2013 <p><a href="http://www.sans.org/">SANS</a> and EDUCAUSE have developed a free privacy awareness video that colleges and universities can use during<a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/educause-policy/community-engagement/data-privacy-month"> Data Privacy Month</a> in January, and throughout the year, in their privacy education and training efforts. High and low resolution versions of the video are available.</p><p><a href="http://www.educause.edu/library/resources/data-privacy-month-awareness-video-2013" target="_blank">read more</a></p> Mon, 14 Jan 2013 17:08:11 +0000 280031 at http://www.educause.edu ERO Video Conversation: The Relationship Between Privacy and Security http://www.educause.edu/ero/article/ero-video-conversation-relationship-between-privacy-and-security <p><a href="http://www.educause.edu/ero/article/ero-video-conversation-relationship-between-privacy-and-security" target="_blank">read more</a></p> Tue, 08 Jan 2013 17:13:46 +0000 279531 at http://www.educause.edu Amassing Student Data and Dissipating Privacy Rights http://www.educause.edu/ero/article/amassing-student-data-and-dissipating-privacy-rights <p>Changes to student privacy regulations and government programs such as the Education Data Initiative underscore the need for meaningful oversight for the protection of student data.</p><p><a href="http://www.educause.edu/ero/article/amassing-student-data-and-dissipating-privacy-rights" target="_blank">read more</a></p> Fri, 04 Jan 2013 19:26:49 +0000 279296 at http://www.educause.edu Bring Your Own Cloud: Data Management Challenges in a Click-Through World http://www.educause.edu/events/security-professionals-conference/2013/bring-your-own-cloud-data-management-challenges-click-through-world Consumer cloud-based services are easy to set up, low cost, and familiar. It's understandable why clients would automatically turn to them for their data-storage needs. But what happens when data security challenges expediency? We will explore a complex case study to examine a university group that turned to free cloud services to share sensitive data. Our discussion will focus on challenges conducting distributed research with limited resources and computing personnel. Solutions to the case will be considered, including working across organizational borders to advocate for customers, building client awareness, and conducting routine security assessments. <p><a href="http://www.educause.edu/events/security-professionals-conference/2013/bring-your-own-cloud-data-management-challenges-click-through-world" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:32:10 +0000 278843 at http://www.educause.edu Third-Party Assessments: Not Just a Questionnaire http://www.educause.edu/events/security-professionals-conference/2013/third-party-assessments-not-just-questionnaire Four years ago, Indiana University began assessing the security of cloud vendors and other third parties using a simple questionnaire. Over time, the process has matured to take advantage of IU's data-classification system and a more formal governance structure involving institutional data stewards and compliance groups. We've also improved our assessment questionnaire and the data-protection language that goes into our contracts. In this presentation, we will track IU's progress on third-party assessments, including successes and obstacles, while encouraging attendees and online participants to share parallel experiences from their own institutions. We'll also discuss goals for future improvements.<p><a href="http://www.educause.edu/events/security-professionals-conference/2013/third-party-assessments-not-just-questionnaire" target="_blank">read more</a></p> Fri, 28 Dec 2012 23:02:21 +0000 278831 at http://www.educause.edu January 2013 is Data Privacy Month! Free Webinars and Easy Ways to Increase Awareness http://www.educause.edu/blogs/vvogel/january-2013-data-privacy-month-free-webinars-and-easy-ways-increase-awareness <p><a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/educause-policy/community-engagement/data-privacy-month">Data Privacy Month</a> is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone&#39;s priority. Spend the month helping to ensure your campus community is respecting privacy, safeguarding data, and enabling trust. This year&#8217;s Data Privacy Month Planning Task Force has selected weekly themes for the higher education community to focus on. Several free webinars will also be offered throughout the month of January.</p><p><a href="http://www.educause.edu/blogs/vvogel/january-2013-data-privacy-month-free-webinars-and-easy-ways-increase-awareness" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/PrivacyTower2.jpg">PrivacyTower2.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/PrivacyHero2.jpg">PrivacyHero2.jpg</a></fieldset> Fri, 21 Dec 2012 19:05:38 +0000 278613 at http://www.educause.edu Data Classification, Security, and Compliance: Helping Users Help Themselves http://www.educause.edu/ero/article/data-classification-security-and-compliance-helping-users-help-themselves <ul> <li>Being able to accurately <strong>identify, manage, and secure data is imperative</strong> in an era where every sector, higher education included, is data-driven.</li> <li>The goal of <strong>data classification policy</strong> is to allow users to <strong>understand, better manage</strong>, and employ an <strong>appropriate level of security</strong> for the data.</li> <li>Using a risk-based approach, the University of Michigan targeted <strong>sensitive regulated data</strong> because such data have specific <strong>legal and regulatory requirements</strong>, as well as fines and <strong>penalties for non-compliance</strong>.</li> <li>Development of a <strong>database-driven tool</strong> will better explain why specific types of data may be used in specific IT services and under what conditions, as well as provide for a <strong>self-service model</strong> for users to <strong>identify sensitive data and compliant IT systems</strong>.</li></ul><p><a href="http://www.educause.edu/ero/article/data-classification-security-and-compliance-helping-users-help-themselves" target="_blank">read more</a></p> Thu, 13 Dec 2012 18:26:05 +0000 278166 at http://www.educause.edu Cloud Security Debate: Cloud Now or Cloud How? http://www.educause.edu/ero/article/cloud-security-debate-cloud-now-or-cloud-how <div class="module centered"> <p><em>During the often-fiery 2012 presidential debate season, a </em><a class="ext" href="http://inside.iu.edu/editors-picks/technology/2012-10-05-tech-cloud-debate.shtml" target="_blank"><em>lively debate</em></a><em> of a different sort held at </em><a class="ext" href="http://www.indiana.edu/" target="_blank"><em>Indiana University</em></a><em> (IU) featured passionate arguments on the nature, status, and future of cloud security in and beyond the higher education environs. Moderated by </em><a href="http://www.educause.edu/members/bradley-wheeler"><em>Brad Wheeler</em></a><em>, IU&#39;s vice president for IT and CIO, the debate featured two figures characterized by Wheeler as symbolic leaders of the &#34;Cloud Now&#34; and &#34;Cloud How&#34; parties:</em></p> <p><a href="http://www.educause.edu/members/shelton-waggener"><em>Shel Waggener</em></a> <em>(Cloud Now) is Senior Vice President at </em><a class="ext" href="http://www.internet2.edu/" target="_blank"><em>Internet2</em></a><em>, where he leads the non-profit&#39;s cloud initiative, called NET+ Services. Waggener was previously CIO for a networking division at Lucent Technologies and CIO and Associate Chancellor at the University of California, Berkeley.</em></p> <p><a href="http://www.educause.edu/members/fred-h-cate"><em>Fred H. Cate</em></a> <em>(Cloud How) is Distinguished Professor and C. Ben Dutton Professor of Law at IU&#39;s </em><a class="ext" href="http://www.law.indiana.edu" target="_blank"><em>Maurer School of Law</em></a><em>, and director of both the </em><a class="ext" href="http://law.indiana.edu/centers/applied-cybersecurity.shtml" target="_blank"><em>Center for Applied Cybersecurity Research</em></a><em> and the </em><a class="ext" href="http://law.indiana.edu/centers/clear.shtml" target="_blank"><em>Center for Law, Ethics, and Applied Research in Health Information</em></a><em>.</em></p> <p><em>Following are highlights of the Waggener&#8211;Cate debate, including salient points, key quotes, and a bit of the color and passion that permeated the sometimes sprawling and always interesting discussion. A full, unabridged transcript is available <a href="http://www.educause.edu/visuals/shared/er/ero12126/Cate-Shel_Debate_Transcript.pdf">here</a>. &#8212;Editor</em></p></div><p>&#160;</p><p><a href="http://www.educause.edu/ero/article/cloud-security-debate-cloud-now-or-cloud-how" target="_blank">read more</a></p> Fri, 30 Nov 2012 21:28:33 +0000 277405 at http://www.educause.edu Data Custodians, It's 11 p.m.: Do You Know Where Your Confidential Data Is? http://www.educause.edu/midwest-regional-conference/2013/data-custodians-its-11-pm-do-you-know-where-your-confidential-data Many campuses find that the proliferation and continued storage of confidential data on desktop and laptop computers to be one of their top security risks. In combination with policy and awareness programs, data loss prevention products can be used to proactively identify and directly notify end users of these sources of risk for proper remediation. Our panelists will share their experiences working with academic, administrative, and governance units to protect data&#8212;legally, ethically, and technically. Bring your experience and questions to this important session. <p><a href="http://www.educause.edu/midwest-regional-conference/2013/data-custodians-its-11-pm-do-you-know-where-your-confidential-data" target="_blank">read more</a></p> Mon, 26 Nov 2012 20:02:21 +0000 277049 at http://www.educause.edu Joint AAU/COGR Letter on FAR FISMA Rule http://www.educause.edu/library/resources/joint-aaucogr-letter-far-fisma-rule <p>This October 18, 2012 letter from the Association af American Universities (AAU) and the Council on Governmental Relations (COGR) sent to the U.S. General Services Administration (GSA) is a response to the proposed amendment to the Federal Acquisition Regulation (FAR) to hold contractors responsible &#34;for the basic safeguarding of contractor information systems that contain information provided by or generated for the Government (other than public information)&#34; (see <a href="https://www.federalregister.gov/articles/2012/08/24/2012-20881/federal-acquisition-regulation-basic-safeguarding-of-contractor-information-systems#h-4">https://www.federalregister.gov/articles/2012/08/24/2012-20881/federal-acquisition-regulation-basic-safeguarding-of-contractor-information-systems#h-4</a>).</p><p>AAU and COGR had previously commented on the DFARS (Case 2008-D028, &#8220;Safeguarding Unclassified Information&#8221;). In this letter, they express concern &#34;about the broad potential scope of the information subject to these requirements.&#34;</p><p><a href="http://www.educause.edu/library/resources/joint-aaucogr-letter-far-fisma-rule" target="_blank">read more</a></p> Tue, 23 Oct 2012 18:58:42 +0000 273952 at http://www.educause.edu Sensitive Regulated Data: Permitted and Restricted Uses http://www.educause.edu/library/resources/sensitive-regulated-data-permitted-and-restricted-uses <p>The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted uses of such university-owned data, including the IT environments in which these data are maintained by university faculty and staff.</p><p><a href="http://www.educause.edu/library/resources/sensitive-regulated-data-permitted-and-restricted-uses" target="_blank">read more</a></p> Tue, 07 Aug 2012 21:18:50 +0000 267339 at http://www.educause.edu Can Big Data Help Universities Tackle Security, BYOD? http://www.educause.edu/library/resources/can-big-data-help-universities-tackle-security-byod <p class="description">Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can&#39;t escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing.</p><p><a href="http://www.educause.edu/library/resources/can-big-data-help-universities-tackle-security-byod" target="_blank">read more</a></p> Tue, 07 Aug 2012 19:35:10 +0000 267319 at http://www.educause.edu Policy Implications of Big Data and Analytics http://www.educause.edu/ero/article/policy-implications-big-data-and-analytics <p>EDUCAUSE Policy recently asked association representatives from ACE, AACC, NACUBO, AASCU, and NAICU what they think are the policy implications that arise with the increased use of big data and analytics in higher education?</p><p><a href="http://www.educause.edu/ero/article/policy-implications-big-data-and-analytics" target="_blank">read more</a></p> Wed, 01 Aug 2012 21:32:45 +0000 267035 at http://www.educause.edu For BYOD Best Practices, Secure Data, Not Devices http://www.educause.edu/library/resources/byod-best-practices-secure-data-not-devices <p class="description">Author, Thor Olavsrud, writes for <em>CIO Magazine</em> that &#34;IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.&#34;</p><p><a href="http://www.educause.edu/library/resources/byod-best-practices-secure-data-not-devices" target="_blank">read more</a></p> Mon, 23 Jul 2012 15:41:00 +0000 266258 at http://www.educause.edu Podcast: Larry Conrad on IT Security Then and Now http://www.educause.edu/blogs/gbayne/podcast-larry-conrad-it-security-then-and-now <p><a href="http://www.educause.edu/members/larry-d-conrad">Larry D. Conrad</a> serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technology with a diverse background in both university and corporate settings. In this conversation, Larry discusses IT security then and now.</p><p>Music: &#34;New Pop Wave&#34; by sebastian6</p><fieldset><legend>EDUCAUSE Podcast Sponsor</legend><a href="http://www.morantechnology.com"><img alt="Moran Technology Consulting" src="http://net.educause.edu/elements/images/MTC_logo.jpg" width="50%" /></a></fieldset><p>&#160;</p><p><a href="http://www.educause.edu/blogs/gbayne/podcast-larry-conrad-it-security-then-and-now" target="_blank">read more</a></p> 11:05 Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technology with a diverse background in both university and corporate settings. In this conversation, Larry discusses IT security then and now. Music: &#34;New Pop Wave&#34; by sebastian6 EDUCAUSE Podcast Sponsor &#160; Larry D. Conrad serves as the vice chancellor for information technology and chief information officer at UNC Chapel Hill. He has over 40 years experience in the field of information technology with a diverse background in both university and corporate settings. In this conversation, Larry discusses IT security then and now. Music: &#34;New Pop Wave&#34; by sebastian6 EDUCAUSE Podcast Sponsor &#160; Tue, 17 Jul 2012 21:18:36 +0000 265867 at http://www.educause.edu Understanding and Managing the Risks of Analytics in Higher Education: A Guide http://www.educause.edu/library/resources/understanding-and-managing-risks-analytics-higher-education-guide <p>This guide provides an introduction to the<strong> major risk categories faced by a higher education institution </strong>considering investments in time, energy, and money in <strong>analytics work</strong>. Under the right circumstances, decision making can be enhanced by the <strong>tools and techniques of analytics; large data sets, analytics engines, and new data visualization techniques</strong> have considerable potential to<strong> enhance both student learning and institutional business intelligence</strong>. However, careful consideration must be given to the risks of such investments for those in institutional leadership roles as well as the risks associated with data and information governance, compliance, and quality.</p><p><a href="http://www.educause.edu/library/resources/understanding-and-managing-risks-analytics-higher-education-guide" target="_blank">read more</a></p> Tue, 03 Jul 2012 14:43:27 +0000 264356 at http://www.educause.edu Policy Dimensions of Analytics in Higher Education http://www.educause.edu/ero/article/policy-dimensions-analytics-higher-education <p>With the increasing demand for more and better analytics, the IT community needs to work with other campus stakeholders to ensure that appropriate data governance, classification, roles and responsibilities, and other policies and procedures are in place.</p><p><a href="http://www.educause.edu/ero/article/policy-dimensions-analytics-higher-education" target="_blank">read more</a></p> Wed, 27 Jun 2012 20:17:29 +0000 264011 at http://www.educause.edu Security Professionals Conference 2012 Recap http://www.educause.edu/blogs/vvogel/security-professionals-conference-2012-recap <p><img alt="10th anniversary Security Conference cake" src="http://www.educause.edu/visuals/shared/HEISC/SEC12%20anniv%20cake%20sm2.jpg" style="width: 160px; height: 96px; float: left;" />Security and IT professionals from the higher education community gathered to celebrate the 10th anniversary of the <a href="http://www.educause.edu/events/security-professionals-conference/2012">Security Professionals Conference</a> in Indianapolis, May 15-17, 2012. This year&#39;s face-to-face event had a record-breaking 438 attendees (an increase of almost 100 participants from the 2011 conference in San Antonio). The online security conference, offered for the second year in a row, was a great success with over 100 registered attendees (estimated exposure to the full online event was approximately 250 participants).</p><p><a href="http://www.educause.edu/blogs/vvogel/security-professionals-conference-2012-recap" target="_blank">read more</a></p> Thu, 07 Jun 2012 21:47:49 +0000 262206 at http://www.educause.edu