-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Audit [x]
- Information Technology Management and Leadership (43)
- Cybersecurity (25)
- Policy and Law (22)
- Security Management (21)
- Federal Policy and Law (17)
- Campus Policy and Law (9)
- Campus Policies (8)
- Data Security (8)
- Identity and Access Management (8)
- Cybersecurity Policy (7)
- Federal Privacy Law (7)
- Security Policies (7)
- Health Insurance Portability and Accountability Act (HIPAA) (6)
- Security Risk Assessment and Analysis (6)
- Incident Handling and Response (5)
- Planning (5)
- Intellectual Property (4)
- Networking and Emerging Technologies (4)
- Privacy (4)
EDUCAUSE Library Items for Audit
-
The Virginia Alliance for Secure Computing and Networking (VA SCAN): A Statewide Collaborative IT Security Resource
-
October 17, 2006
This case study examines ways in which the Virginia Alliance for Secure Computing and Networking (VA SCAN) provides a blueprint for higher education institutions interested in collaboratively pro…
-
Privacy Protection and Compliance in Higher Education: The Role of the CPO
-
January 1, 2006
© 2006 Lauren Steinfeld and Kathleen Sutherland Archuleta EDUCAUSE Review, vol. 41, no. 5 (September/October 2006): 62–71 Lauren Steinfeld serves as Chief Privacy Officer at the Univ…
-
Tracking the Storm: IT Readiness for Business Continuity in Higher Education
-
June 30, 2006
Presentation at the Fifth Annual ECAR/HP Summer Symposium for Higher Education IT Executives, June 28-30, 2006, Coronado, California. This presentation describes the preliminary findings of ECAR&…
-
The Auditor’s Dilemma: Audit Issues for Higher Education in the Information Age
-
May 23, 2006
May 23, 2006, presentation to the Big 12 Auditors. May 23, 2006, presentation to the Big 12 Auditors. …
-
Properly Securing "Sensitive Information" Across The Campus
-
January 12, 2006
|
A session at the EDUCAUSE Mid-Atlantic Regional Conference 2006
Information Technologies began making departments aware of their responsibilities to protect personal information. Surveys indicated that although most departments knew about policies, few were awa…
-
Campus PKI Audits Panel
-
July 27, 2005
A requirement for auditing is integral to all PKI deployments. This panel will discuss campus audit requirements and options, including the various types and frequency of audits, likely costs, and …
-
Optimizing Business Processes at Brooklyn College and the City University of New York
-
June 15, 2005
As a complement to the ECAR research study called Good Enough! IT Investment and Business Process Performance in Higher Education, this case study explores how Brooklyn College and The City Unive…
-
Management and Policy: Mapping HIPAA to the Middleware Layer
-
February 10, 2005
This session provides an overview of how middleware can be used to address regulatory issues that often span application and organizational boundaries. HIPAA requirements for security and privacy a…
-
Identity and Access Management for HIPAA: Technology Model
-
February 10, 2005
This session illustrates how specific HIPAA requirements for security, privacy, and auditability can be addressed by the application of identity and access management middleware as defined by the N…
-
Building a Health Information Infrastructure to Support HIPAA
-
February 10, 2005
The Health Insurance Portability and Accountability Act (HIPAA) places a significant regulatory burden on academic medical centers. Requirements for privacy, access control, training, and tracking …

















