-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Save the date!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Data Breach [x]
- Cybersecurity Policy (33)
- Federal Policy and Law (33)
- Policy and Law (33)
- Cybersecurity (30)
- Security Management (28)
- Data Security (22)
- Incident Handling and Response (10)
- Federal Privacy Law (9)
- Privacy (8)
- Campus Policies (4)
- Campus Policy and Law (4)
- Data Privacy (4)
- Information Technology Management and Leadership (4)
- Network Security and Applications (4)
- Online Privacy (3)
- Security Risk Assessment and Analysis (3)
- Identity Theft (2)
- Security Policies (2)
- State Policy and Law (2)
Sources of Data Security Breaches
- Chronology of Data Breaches (Privacy Rights Clearinghouse)
- DataLossDB
- DataBreaches.net
- Health Information Privacy: Breaches Affecting 500 or More Individuals (part of the HIPAA and HITECH Act's breach notification requirements)
- Identity Theft Resource Center Data Breach Reports
- Ponemon Institute's Security Research Studies & White Papers (includes Cost of Data Breach annual benchmark study)
Related Topics
Library Items on this Topic
EDUCAUSE Library Items for Data Breach
-
Data Breach
-
Data Breach True Sources of Data Security Breaches …
-
Privacy and Security Initiatives and Recommendations from the U.S. Department of Education
-
February 26, 2013
Key Takeaways At EDUCAUSE 2012, U.S. Department of Education speakers discussed new privacy and security initiatives, as well as offering recommendations on navigating privacy ef…
-
Data Privacy Day 2013 Event
-
January 28, 2013
The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused on helping all digital citizens stay safer and more secure online, kicked off Data Privacy Day 2013 wi…
-
7 Ways BYOD Could Get You Sued
-
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
-
Internet Privacy Legislation: What the White House, Federal Trade Commission, and the European Commission Are Recommending
-
May 22, 2012
On May 14, 2012, the Congressional Internet Caucus Advisory Committee sponsored the discussion, “New Internet Privacy Legislation: What the White House, Federal Trade Commission and the Europe…
-
Privacy and Security Risks in Higher Education
-
January 10, 2012
This webinar is one in a series celebrating Data Privacy Month 2012 . Privacy is a major and often underappreciated risk area for institutions of higher education. Many data security brea…
-
A Day at the Breach
-
March 13, 2012
|
A session at the NERCOMP Annual Conference 2012
It's August 10 at the University of Wisconsin–Milwaukee and the school is not contemplating how to spend a day at the beach. Instead, they are informing approximately 75,000 individuals asso…
-
The 3 Rs of Responding to a Major Data Breach
-
March 26, 2012
|
A session at the EDUCAUSE Midwest Regional Conference 2012
Responding to a major data breach is an activity that none of us would welcome, yet many feel that having a data breach is not a matter of "if," but "when." In 2011, our campus …
-
Data Breach Notification: Discussing Reactive Processes and Proactive Strategies
-
April 5, 2011
|
A session at the Security Professionals Conference 2011
Data security and privacy are focal points in many institutions' information security programs. There is a complex set of legal and regulatory frameworks for protecting data that we are entrus…
-
House Homeland Security Subcmte. Hearing on Cyber Attacks
-
April 24, 2012
The Subcommittee on Oversight, Investigations, and Management of the House Homeland Security Committee held a hearing this afternoon entitled " America is Under Cyber Attack: Why U…

















