Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by Publications
Filter by Library Taxonomy
Data Privacy Month
Data Privacy Month (DPM) is an annual effort to empower people to protect their privacy and control their digital footprint, as well as escalate the protection of privacy and data as everyone's priority. Data Privacy Month will be celebrated in 2014 starting with Data Privacy Day on January 28 and running through February 28. Spend the month helping to ensure your campus community is respecting privacy, safeguarding data, and enabling trust. Visit the Data Privacy Month website for examples of campus activities, as well as archived recordings of previous webinars. It's never to early to begin planning your institution's efforts!
Privacy in a Networked Environment
With the explosive growth of electronic networks and wide accessibility of online information, EDUCAUSE members -- along with many other higher education constituencies -- are dealing with a formidable set of privacy issues. A key set of issues revolves around the handling of student information, which under the Family Educational Rights and Privacy Act (FERPA) of 1974 enjoys special protection.
Other Sources of Information about Online Privacy
- Electronic Frontier Foundation, a non-profit civil liberties organization working in the public interest to protect privacy, free expression, and access to public resources and information in new media.
- Electronic Privacy Information Center (EPIC), a public interest research center in Washington, D.C., established in 1994 to focus public attention on emerging civil liberties issues and to protect privacy.
- Privacy Forum, a moderated digest for the discussion and analysis of issues relating to the general topic of privacy (both personal and collective) in the "information age" of the 1990's and beyond.
- Computer Professionals for Social Responsibility (CPSR), a public-interest alliance of computer scientists and others interested in the impact of computer technology on society.
Library Items on this Topic
EDUCAUSE Library Items for Federal Privacy Law
- The Top 3 Strategic Information Security Issues
January 12, 2015
Joanna Lyn Grama is IT GRC and Cybersecurity Program Director, EDUCAUSE. Valerie Vogel is Program Manager, EDUCAUSE. Visit the EDUCAUSE top 10 IT issues web page for additional resourc…
- Achieving the (Often Delicate) Balance between Technology and Information Security
January 12, 2015
Ronald L. Vaughn, President of the University of Tampa since January 1995 and holder of the Max H. Hollingsworth Chair of American Enterprise, previously served as Coordinator of the Depa…
- Outside the Box: Evolution & Ascent of the CISO
November 24, 2014
November 24, 2014 ERO141109 …
- When Worlds Collide: IP-Based Video Surveillance on an IT Network
August 11, 2014
Key Takeaways Unable to salvage its ailing analog surveillance system , the Central Piedmont Community College's Information Technology Services Department installed an IP-ba…
- The Security Dilemma of Desktop Access to ERP Systems
August 11, 2014
Key Takeaways With information security shifting from the data center to the desktop , organizations must have an aggressive patch-management program — though implementing…
- Advancing Without New Resources
July 14, 2014
The expectations for IT services in higher education will not lessen, and the rate of change will not decelerate. How can the IT organization address these demands without new resources? By ma…
- Community Engagement for Security and Safety
August 5, 2013
Earving L. Blythe is Vice President Emeritus, Information Technology, at Virginia Tech. As educators and IT professionals, we all are cognizant of how technological innovation is ch…
- EDUCAUSE Top-10 IT Issues 2013
June 3, 2013
A quick rundown of the list with comments from higher education IT leaders. A quick rundown of the list with comments from hi…
- Containing the Security Threat of Mobile Apps in Higher Ed
May 6, 2013
Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…
- An Incremental Approach to Building an Information Security Program
April 1, 2013
Key Takeaways Constraints such as tight budgets, increased responsibilities, lack of resources or incentive, and disagreement on a common approach to information security pose ch…