-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Are You Ready? A Planning Tool for Managing Sensitive Data Incidents
Wednesday
May 16th, 2012
4:00 PM - 5:30 PM
America/Indianapolis
White River Ballroom A
Change Timezone
TIMEZONE
View this schedule in your local timezone (Pacific Time) or select a different location:
Session Type: Concurrent Session
Universities have had to deal with many different types of incidents involving the exposure of sensitive and legally protected information. When an incident occurs, those involved usually have limited experience with such occurrences. They look for guidance to manage the appropriate response, including incident identification, assessment, eradication, recovery, notification, and follow-up. The EDUCAUSE HEISC Governance, Risk, and Compliance Working Group has developed a framework and checklist for universities, schools, and departments to easily come up to speed and manage such incidents effectively and efficiently. We'll walk through the resources available in the sensitive data exposure incident checklist.
Speakers
Convener
There is no convener for this session. Log In to volunteer as a Convener for this session.
















