Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
- Podcasts (23)
- Blogs (29)
- Agreements or Contracts (2)
- Articles, Briefs, Papers, and Reports (142)
- Blogs and Wikis (2)
- Effective Practices (1)
- Government Documents, Laws, Testimonies or Reports (10)
- Plans and Guidelines (3)
- Policies and Procedures (20)
- Presentations and Seminars (115)
- Programs and Projects (1)
- Surveys (5)
- Tools (5)
- Videos (1)
- Web Sites (1)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 8 Mobile Device Security Steps, EDUCAUSELive!, October 2013. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most effective strategies for securing mobile infrastructure.
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy, June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
- Managing and Securing Mobile Devices in Higher Education, May 2013.
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- Finding New Business Models in Unsettled Times
November 10, 2014
If the core crisis in higher education is one of sustainability, being focused on the job to be done and having a grasp of the forces shaping higher education gives institutional leaders a new…
- Outside the Box: Evolution & Ascent of the CISO
November 24, 2014
November 24, 2014 ERO141109 …
- U.S. Dept. of Ed. Links State Authorization and Gainful Employment Regs.
October 31, 2014
Russ Poulin, Deputy Director of Research and Analysis at WCET, has posted an initial update on the U.S. Department of Education's new gainful employment regulations and the suprising link th…
- Technology, Equality and Accessibility in College and Higher Education Act (TEACH Act) Legal Analysis
September 16, 2014
The proposed Technology, Equality and Accessibility in College and Higher Education Act (“TEACH Act”) would authorize development of accessibility guidelines for digital instructional materia…
- Developing A Comprehensive Privacy Program: A Step-By-Step Guide
December 13, 2013
Daniel Solove wrote Developing A Comprehensive Privacy Program: A Step-By-Step Guide in 2013 for The National Assoication of College and University Attorneys (NACUA). This guide seeks to…
- New Year, New Challenges: Preparing Your Campus for Data Privacy and Security Issues in the Year Ahead
December 19, 2013
As technology continues to evolve, so do the data privacy and security risks facing colleges and universities. New products and programs have made it easier to teach, gather, and share informat…
- Learning Analytics and Ethics: A Framework beyond Utilitarianism
August 25, 2014
Utilitarian concerns increasingly drive machine ethics, particularly the few ethical discussions in learning analytics. Determining the most good for the most people is a responsible way forwa…
- Questions of Data Ownership on Campus
August 25, 2014
Valid arguments exist for students to control data about themselves, and similarly plausible arguments suggest that the institution can claim ownership. This article explores both perspectives…
- IT Security Questionnaire/IT Standards and Requirements Questionnaire
July 14, 2014
The University of Missouri IT Standards and Requirements Questionnaire (ITSRQ), currently in draft form, is predominantly focused on SaaS solutions although it can be readily adapted for other pu…
- Top 10 Blogs about Postsecondary Next Gen Learning
August 15, 2014
What blogs do you read and rely on to stay up-to-date with the latest developments in – or speculations about – next generation learning? My NGLC colleague Stefanie Blouin surveyed the K-12 c…