EDUCAUSE | Mobile Security http://www.educause.edu/Resources/Browse/MobileSecurity/39148 en EDUCAUSE | Mobile Security http://www.educause.edu/Resources/Browse/MobileSecurity/39148 http://www.educause.edu/sites/all/themes/educause/images/e_rss.png Executive Summary: BYOD and Consumerization of IT in Higher Education Research, 2013 http://www.educause.edu/ero/article/executive-summary-byod-and-consumerization-it-higher-education-research-2013 <p><em>&#34;What excites IT leaders in higher education most about BYOE are opportunities to diversify and expand the teaching and learning environment, while the greatest challenges are issues that pertain to faculty and staff use of their own devices for work-related purposes.&#34;</em></p><p><a href="http://www.educause.edu/ero/article/executive-summary-byod-and-consumerization-it-higher-education-research-2013" target="_blank">read more</a></p> Thu, 07 Mar 2013 21:05:06 +0000 283712 at http://www.educause.edu Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven? http://www.educause.edu/ero/article/privacy-security-and-compliance-strange-bedfellows-or-marriage-made-heaven <p>The authors examine several campus issues lying at the intersection of privacy, security, and compliance and provide insight for institutional leaders planning strategic directions.</p><p><a href="http://www.educause.edu/ero/article/privacy-security-and-compliance-strange-bedfellows-or-marriage-made-heaven" target="_blank">read more</a></p> Fri, 04 Jan 2013 18:00:24 +0000 279281 at http://www.educause.edu January 2013 is Data Privacy Month! Free Webinars and Easy Ways to Increase Awareness http://www.educause.edu/blogs/vvogel/january-2013-data-privacy-month-free-webinars-and-easy-ways-increase-awareness <p><a href="http://www.educause.edu/focus-areas-and-initiatives/policy-and-security/educause-policy/community-engagement/data-privacy-month">Data Privacy Month</a> is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone&#39;s priority. Spend the month helping to ensure your campus community is respecting privacy, safeguarding data, and enabling trust. This year&#8217;s Data Privacy Month Planning Task Force has selected weekly themes for the higher education community to focus on. Several free webinars will also be offered throughout the month of January.</p><p><a href="http://www.educause.edu/blogs/vvogel/january-2013-data-privacy-month-free-webinars-and-easy-ways-increase-awareness" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/PrivacyTower2.jpg">PrivacyTower2.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/PrivacyHero2.jpg">PrivacyHero2.jpg</a></fieldset> Fri, 21 Dec 2012 19:05:38 +0000 278613 at http://www.educause.edu Sensitive Regulated Data: Permitted and Restricted Uses http://www.educause.edu/library/resources/sensitive-regulated-data-permitted-and-restricted-uses <p>The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted uses of such university-owned data, including the IT environments in which these data are maintained by university faculty and staff.</p><p><a href="http://www.educause.edu/library/resources/sensitive-regulated-data-permitted-and-restricted-uses" target="_blank">read more</a></p> Tue, 07 Aug 2012 21:18:50 +0000 267339 at http://www.educause.edu AT&T Splits Phones into Work and Personal Partitions, on any Carrier http://www.educause.edu/library/resources/att-splits-phones-work-and-personal-partitions-any-carrier <p>AT&#38;T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology that works on both Android and iPhones creates a work container that is isolated from an employee&#39;s personal applications and data, letting IT shops manage just the portion of the phone related to work.</p><p><a href="http://www.educause.edu/library/resources/att-splits-phones-work-and-personal-partitions-any-carrier" target="_blank">read more</a></p> Tue, 07 Aug 2012 20:53:13 +0000 267331 at http://www.educause.edu 7 Ways BYOD Could Get You Sued http://www.educause.edu/library/resources/7-ways-byod-could-get-you-sued <p>The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy.</p><p><a href="http://www.educause.edu/library/resources/7-ways-byod-could-get-you-sued" target="_blank">read more</a></p> Tue, 07 Aug 2012 20:27:47 +0000 267328 at http://www.educause.edu Can Big Data Help Universities Tackle Security, BYOD? http://www.educause.edu/library/resources/can-big-data-help-universities-tackle-security-byod <p class="description">Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can&#39;t escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing.</p><p><a href="http://www.educause.edu/library/resources/can-big-data-help-universities-tackle-security-byod" target="_blank">read more</a></p> Tue, 07 Aug 2012 19:35:10 +0000 267319 at http://www.educause.edu For BYOD Best Practices, Secure Data, Not Devices http://www.educause.edu/library/resources/byod-best-practices-secure-data-not-devices <p class="description">Author, Thor Olavsrud, writes for <em>CIO Magazine</em> that &#34;IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data.&#34;</p><p><a href="http://www.educause.edu/library/resources/byod-best-practices-secure-data-not-devices" target="_blank">read more</a></p> Mon, 23 Jul 2012 15:41:00 +0000 266258 at http://www.educause.edu Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT http://www.educause.edu/blogs/gbayne/podcast-tom-zeller-dramatic-changes-higher-ed-it <p><a href="http://www.educause.edu/members/tom-zeller">Tom Zeller</a> has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in emerging technologies. In this conversation, Zeller discusses the changes he is seeing in higher education IT, the consumerization of IT, and IU&#39;s approach to security around mobile devices.</p><p>Music: &#34;New Pop Wave&#34; by sebastian6</p><fieldset><legend>EDUCAUSE Podcast Sponsor</legend><a href="http://www.morantechnology.com "><img alt="Moran Technology Consulting" src="http://net.educause.edu/elements/images/MTC_logo.jpg" width="50%" /></a></fieldset><p>&#160;</p><p><a href="http://www.educause.edu/blogs/gbayne/podcast-tom-zeller-dramatic-changes-higher-ed-it" target="_blank">read more</a></p> 10:23 Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in emerging technologies. In this conversation, Zeller discusses the changes he is seeing in higher education IT, the consumerization of IT, and IU&#39;s approach to security around mobile devices. Music: &#34;New Pop Wave&#34; by sebastian6 EDUCAUSE Podcast Sponsor &#160; Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in emerging technologies. In this conversation, Zeller discusses the changes he is seeing in higher education IT, the consumerization of IT, and IU&#39;s approach to security around mobile devices. Music: &#34;New Pop Wave&#34; by sebastian6 EDUCAUSE Podcast Sponsor &#160; Wed, 11 Jul 2012 16:24:29 +0000 265193 at http://www.educause.edu Security Professionals Conference 2012 Recap http://www.educause.edu/blogs/vvogel/security-professionals-conference-2012-recap <p><img alt="10th anniversary Security Conference cake" src="http://www.educause.edu/visuals/shared/HEISC/SEC12%20anniv%20cake%20sm2.jpg" style="width: 160px; height: 96px; float: left;" />Security and IT professionals from the higher education community gathered to celebrate the 10th anniversary of the <a href="http://www.educause.edu/events/security-professionals-conference/2012">Security Professionals Conference</a> in Indianapolis, May 15-17, 2012. This year&#39;s face-to-face event had a record-breaking 438 attendees (an increase of almost 100 participants from the 2011 conference in San Antonio). The online security conference, offered for the second year in a row, was a great success with over 100 registered attendees (estimated exposure to the full online event was approximately 250 participants).</p><p><a href="http://www.educause.edu/blogs/vvogel/security-professionals-conference-2012-recap" target="_blank">read more</a></p> Thu, 07 Jun 2012 21:47:49 +0000 262206 at http://www.educause.edu Rolling Out a BYOD (Bring Your Own Device) Program http://www.educause.edu/library/resources/rolling-out-byod-bring-your-own-device-program <p>Use of <strong>personally owned devices</strong> continues to grow on campuses. If we don&#8217;t<strong> support these devices</strong>, community members will find their own way to support them, which could put our networks and information at risk. <strong>A &#8220;bring your own device&#8221; program</strong> is about supporting your community in the ways they want to work, teach, and learn by allowing them to use the most appropriate tool for the job, while on the IT side, we keep acquisition and support costs, information privacy, and security&#8212;including network security&#8212;in check.<strong> This session will offer ideas, sample policy statements and guidelines, and lessons learned for campuses interested in implementing a BYOD strategy for mobile devices.</strong></p><p><span style="color:#ff0000;"><strong>NOTE:</strong> We experienced an Adobe Connect failure at 1:40 p.m. ET. on June 5th. </span><strong>This webinar was held again on Thursday, June 14 at 1 p.m. </strong>The first speaker, Carol Kondrach, gave a five-minute recap, and the second speaker, Steve deFilipio, gave his full presentation</p><p><a href="http://www.educause.edu/library/resources/rolling-out-byod-bring-your-own-device-program" target="_blank">read more</a></p> Tue, 29 May 2012 18:32:24 +0000 258324 at http://www.educause.edu Multiple Devices and Platforms: Institutional Strategies http://www.educause.edu/library/resources/multiple-devices-and-platforms-institutional-strategies <p> This CNI&rsquo;s Executive Roundtable on multiple devices and platforms discussed institutional strategies concerning BYOD. Faculty, staff, and students in our institutions continue to use laptops and desktop computers but now also bring a variety of mobile devices &ndash; notably smartphones and tablets &ndash; to campus.&nbsp; They have increasing expectations for the seamless use of a variety of devices to access all types of content and services.&nbsp; With the growing popularity of platform-specific apps and proprietary formats for some types of information resources, we may be moving away, at least temporarily, from the gains achieved by the focus on interoperability that marked the earlier years of the development of networked information. Teams from 11 higher education institutions described their experiences, concerns, strategies, and future plans on these issues.</p><p><a href="http://www.educause.edu/library/resources/multiple-devices-and-platforms-institutional-strategies" target="_blank">read more</a></p> Fri, 18 May 2012 14:55:55 +0000 253854 at http://www.educause.edu Cybercrime Threats: How Criminals Bypass Security Measures to Steal Your Sensitive Data and Money and Ruin Your Reputation http://www.educause.edu/events/security-professionals-conference/cybercrime-threats-how-criminals-bypass-security-measures-steal-your-sensitive-data- Data breaches and credential/PII theft incidents are becoming more prevalent, and recent red flag rules require heightened data security procedures. Meanwhile, BYOD, social media proliferation, and a growing reliance on cloud and SaaS applications only increase the chance that your users' devices will be compromised. Cybercriminals have created malicious software specifically designed to bypass your existing security controls and network and application protection measures by infecting end-user devices directly. This malware evades standard antivirus and antimalware solutions. We'll describe these cybercrime techniques, review lessons learned from recent incidents, and present possible solutions.<p><a href="http://www.educause.edu/events/security-professionals-conference/cybercrime-threats-how-criminals-bypass-security-measures-steal-your-sensitive-data-" target="_blank">read more</a></p> Fri, 02 Mar 2012 20:54:18 +0000 247538 at http://www.educause.edu Field Research: Mobility in the Age of Consumerization http://www.educause.edu/library/resources/field-research-mobility-age-consumerization <p> This 31-page report analyzes the results of a recent Gartner research study performed between August and October of 2011. The study focused on enterprise mobility and was designed to generate qualitative data using in-depth conversations and qualitative analysis. Trends, observations, and recommendations are the core of this research. The report includes recommendations that are appropriate to colleges and universities today.</p><p> <em>Citation for this Work</em>: Gartner, Inc., <em>Field Research: Mobility in the Age of Consumerization</em>, by Michael Disabato, 22 January 2012.</p><p> EDUCAUSE Center for Applied Research (ECAR) higher education subscribers have access to specialized research reports from Gartner, a leading independent research and advisory company, at no additional charge. Learn more about ECAR at <a href="http://www.educause.edu/ecar">http://www.educause.edu/ecar</a>.</p><p> <strong>ECAR Subscribers ? You must be logged in to the EDUCAUSE website to access Gartner resources.</strong></p><p> Access to the report expires on February 10, 2013.</p><p><a href="http://www.educause.edu/library/resources/field-research-mobility-age-consumerization" target="_blank">read more</a></p> Mon, 13 Feb 2012 23:06:53 +0000 246626 at http://www.educause.edu Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices http://www.educause.edu/events/enterprise-it-leadership-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are in this process and share experiences such as building mobile device security awareness into the training program and managing technology implementation options. This session will offer ideas, security awareness content, an implementation checklist, and sample policy statements for those campuses just embarking on developing and implementing a smart device security strategy.<p><a href="http://www.educause.edu/events/enterprise-it-leadership-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices" target="_blank">read more</a></p> Tue, 31 Jan 2012 20:17:39 +0000 245912 at http://www.educause.edu Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices http://www.educause.edu/events/security-professionals-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are in this process and share experiences such as building mobile device security awareness into the training program and managing technology implementation options. This session will offer ideas, security awareness content, an implementation checklist, and sample policy statements for those campuses just embarking on developing and implementing a smart device security strategy.<p> </p><p><b>Tweet your thoughts and reflections using this unique session hashtag: #MobileLions</b></p><p><a href="http://www.educause.edu/events/security-professionals-conference/lions-and-tigers-and-mobile-devices-removing-fear-factor-securing-smart-devices" target="_blank">read more</a></p> Tue, 31 Jan 2012 16:48:36 +0000 245823 at http://www.educause.edu Tools, Techniques, and Practices: Lightning Round http://www.educause.edu/events/security-professionals-conference/tools-techniques-and-practices-lightning-round <p>Discover the tools, techniques, and practices that are already working in higher education and how you can adapt these at your institutions.</p><p>Georgia Tech&#8212;Fighting Backlinks: Identifying and Mitigating Unauthorized Ads on Your Webserver<br /> University at Albany&#8211;SUNY&#8212;Netflow-Indexer: Indexing Your Existing Netflow Data for Lightning Fast Searches<br /> Drexel University&#8212;Security Issues Related to Smart Phone Applications<br /> Indiana University&#8212;InCommon Silver Compliance Validation Developed by the Big 10 IT Auditors</p><p><a href="http://www.educause.edu/events/security-professionals-conference/tools-techniques-and-practices-lightning-round" target="_blank">read more</a></p> Mon, 30 Jan 2012 15:48:51 +0000 245658 at http://www.educause.edu Mobile and Cloud Security: Practical Applications of the <i>Information Security Guide</i> http://www.educause.edu/events/security-professionals-conference/mobile-and-cloud-security-practical-applications-information-security-guide As a security professional, have you been asked to evaluate or provide input on security for cloud computing or mobile technologies when neither is really your area of expertise? Don't panic! Use the <i>Information Security Guide</i>, sponsored by the EDUCAUSE/Internet2 Higher Education Information Security Council. We'll discuss practical security considerations for cloud computing and mobile devices. All references are from the <i>Information Security Guide</i>.<p><a href="http://www.educause.edu/events/security-professionals-conference/mobile-and-cloud-security-practical-applications-information-security-guide" target="_blank">read more</a></p> Mon, 30 Jan 2012 15:48:25 +0000 245648 at http://www.educause.edu Mobile and Cloud Security: Practical Applications of the <i>Information Security Guide</i> http://www.educause.edu/southeast-regional-conference/2012/mobile-and-cloud-security-practical-applications-information-security-guide Have you been asked to evaluate or provide input on security for cloud computing or mobile technologies, but neither of these is really your area of expertise? Don't panic! Use the <i>Information Security Guide</i>, sponsored by the EDUCAUSE/Internet2 Higher Education Information Security Council. We'll discuss practical security considerations for cloud computing and mobile devices. All references are from the <i>Information Security Guide</i>.<p><a href="http://www.educause.edu/southeast-regional-conference/2012/mobile-and-cloud-security-practical-applications-information-security-guide" target="_blank">read more</a></p> Wed, 25 Jan 2012 22:18:42 +0000 245452 at http://www.educause.edu Podcast: Jodi Ito on the Information Security Program at the University of Hawaii http://www.educause.edu/blogs/gbayne/podcast-jodi-ito-information-security-program-university-hawaii <p><a href="http://www.educause.edu/Community/MemDir/Profiles/JodiAnnIto/43074">Jodi Ito</a> is the <strong>Information Security Officer</strong> at the University of Hawaii. She is responsible for the <strong>development and implementation</strong> of the university&#39;s new information <strong>security program</strong>, investigations and analyses of <strong>cyber incidents and attacks</strong>, coordination of any remediation and <strong>response efforts</strong> including coordination with any law enforcement agencies, <strong>awareness and training</strong> of information security issues and <strong>enforcing university policy</strong> with respect to the university&#39;s technology resources.</p><p>Music by <a href="http://www.janeaubourg.com.au/">Jane Aubourg</a></p><p><a href="http://www.educause.edu/blogs/gbayne/podcast-jodi-ito-information-security-program-university-hawaii" target="_blank">read more</a></p> 10:08 Jodi-Ann Ito - John Bucher Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university&#39;s new information security program, investigations and analyses of cyber incidents and attacks, coordination of any remediation and response efforts including coordination with any law enforcement agencies, awareness and training of information security issues and enforcing university policy with respect to the university&#39;s technology resources. Music by Jane Aubourg Jodi Ito is the Information Security Officer at the University of Hawaii. She is responsible for the development and implementation of the university&#39;s new information security program, investigations and analyses of cyber incidents and attacks, coordination of any remediation and response efforts including coordination with any law enforcement agencies, awareness and training of information security issues and enforcing university policy with respect to the university&#39;s technology resources. Music by Jane Aubourg Fri, 20 Jan 2012 20:32:23 +0000 245147 at http://www.educause.edu Higher Education Information Security Council Releases 2012-13 Strategic Plan http://www.educause.edu/blogs/vvogel/higher-education-information-security-council-releases-2012-13-strategic-plan <p> The <a href="http://www.educause.edu/Resources/HigherEducationInformationSecu/199635">Higher Education Information Security Council 2012-13 Strategic Plan</a> is now available online. This strategic plan is intended to set forth a vision for the higher education information security community and provide a concise roadmap to guide the efforts of the HEISC in 2012 and 2013. If you missed the <a href="http://www.educause.edu/blog/vvogel/SavetheDateHEISCTownHallWebina/243020">Town Hall webinar</a> on January 9, where we discussed the council&#39;s vision, mission, goals, objectives, and current working group activities, an <a href="http://educause.adobeconnect.com/p1y836l7i1t/">archived recording</a> is now available.</p><p> <a href="mailto:security-council@educause.edu?subject=HEISC%20Strategic%20Plan">Contact us</a> if you have any questions or feedback.</p><p><a href="http://www.educause.edu/blogs/vvogel/higher-education-information-security-council-releases-2012-13-strategic-plan" target="_blank">read more</a></p> Wed, 04 Jan 2012 23:18:08 +0000 244131 at http://www.educause.edu 2012 Planning Guide: Identity and Privacy http://www.educause.edu/library/resources/2012-planning-guide-identity-and-privacy <p> After two years of rapid and disruptive change in the identity market, 2012 promises even more of the same. Intensifying policy battles, increased levels of fraud and privacy intrusion, continuing adoption of cloud services, explosive adoption of mobile devices, and architectural innovations in the market will drive an accelerating evolution of privacy architectures and services this year.</p><p> <em>Citation for this Work</em>: Gartner, Inc., <em>2012 Planning Guide: Identity and Privacy</em>, by Bob Blakley, 1 November 2011.</p><p> EDUCAUSE Center for Applied Research (ECAR) higher education subscribers have access to specialized research reports from Gartner, a leading independent research and advisory company, at no additional charge. Learn more about ECAR at <a href="http://www.educause.edu/ecar">http://www.educause.edu/ecar</a>.</p><p> <strong>ECAR Subscribers ? You must be logged in to the EDUCAUSE website to access Gartner resources.</strong></p><p><a href="http://www.educause.edu/library/resources/2012-planning-guide-identity-and-privacy" target="_blank">read more</a></p> Fri, 09 Dec 2011 22:25:35 +0000 243149 at http://www.educause.edu HEISC Town Hall Webinar (1/9/12 archived recording available) http://www.educause.edu/blogs/vvogel/heisc-town-hall-webinar-1912-archived-recording-available <p> Now available: A recording of the Higher Education Information Security Council (HEISC) <a href="http://educause.adobeconnect.com/p1y836l7i1t/"><strong>Town Hall webinar</strong></a> held on <strong>January 9, 2012</strong>. Council co-chair <a href="http://www.educause.edu/Community/MemDir/Profiles/LarryDConrad/39536">Larry Conrad</a> presented the <a href="http://www.educause.edu/Resources/HigherEducationInformationSecu/199635">2012-2013 HEISC strategic plan</a> to the higher ed community. Participants had a chance to share feedback regarding the goals and objectives. Access the <a href="http://educause.adobeconnect.com/p1y836l7i1t/">recording</a> or download the <a href="http://www-cdn.educause.edu/sites/default/files/HEISC%20Town%20Hall%20Jan2012%20slides.pdf">presentation slides</a>.</p><p><a href="http://www.educause.edu/blogs/vvogel/heisc-town-hall-webinar-1912-archived-recording-available" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-application-pdf"><img class="field-icon-application-pdf" alt="application/pdf icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/application-pdf.png" /></div> <a href="http://www.educause.edu/sites/default/files/HEISC%20Town%20Hall%20Jan2012%20slides.pdf">HEISC Town Hall Jan2012 slides.pdf</a></fieldset> Thu, 08 Dec 2011 20:43:39 +0000 243020 at http://www.educause.edu January is Data Privacy Month: Free Webinars and Easy Ways to Increase Awareness http://www.educause.edu/blogs/vvogel/january-data-privacy-month-free-webinars-and-easy-ways-increase-awareness <p>You know the importance of protecting personal identities and the effects social media can have on privacy, but does everyone on your campus? During the month of January, EDUCAUSE is expanding on <a href="http://dataprivacyday2011.org/">Data Privacy Day</a> to provide an entire month&#8217;s worth of activities and resources to help raise data privacy awareness. You can participate by attending the upcoming webinars and creating a plan to increase awareness on your campus with the easy-to-implement suggestions listed below. You can also visit the <a href="http://www.educause.edu/policy/dataprivacy">EDUCAUSE Data Privacy Month page</a> for additional resources and information or read more about the <a href="http://www.educause.edu/blog/vvogel/HistoryofDataPrivacyDay/243148">history of Data Privacy Day</a>.</p><h3>January 2012 Webinars</h3><p>EDUCAUSE hosted several webinars on data privacy throughout the month of January:</p><p><a href="http://www.educause.edu/blogs/vvogel/january-data-privacy-month-free-webinars-and-easy-ways-increase-awareness" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-png"><img class="field-icon-image-png" alt="image/png icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/dataPrivacyMonth_0.png">dataPrivacyMonth.png</a></fieldset> Wed, 07 Dec 2011 15:37:27 +0000 242852 at http://www.educause.edu January is Data Privacy Month: Free Webinars and Easy Ways to Increase Awareness http://www.educause.edu/blogs/fyfthgeer/january-data-privacy-month-free-webinars-and-easy-ways-increase-awareness <p> You know the importance of protecting personal identities and the effects social media can have on privacy, but does everyone on your campus? During the month of January, EDUCAUSE is expanding on <a href="http://dataprivacyday2011.org/">Data Privacy Day</a> to provide an entire month&rsquo;s worth of activities and resources to help raise data privacy awareness. You can participate by attending the upcoming webinars and creating a plan to increase awareness on your campus with the easy-to-implement suggestions listed below. You can also visit the <a href="http://www.educause.edu/policy/dataprivacy">EDUCAUSE Data Privacy Month page</a> for additional resources and information.</p><h2> January 2012 Webinars</h2><p> EDUCAUSE hosted several webinars on data privacy throughout the month of January:</p><p><a href="http://www.educause.edu/blogs/fyfthgeer/january-data-privacy-month-free-webinars-and-easy-ways-increase-awareness" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-png"><img class="field-icon-image-png" alt="image/png icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/DataPrivacyMonth.png">DataPrivacyMonth.png</a></fieldset> Wed, 07 Dec 2011 14:19:24 +0000 242849 at http://www.educause.edu