-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Search the EDUCAUSE Library
All Results from the EDUCAUSE Library
-
NIST Posts Initial Analysis of Comments on Cybersecurity Framework
-
May 21, 2013
The National Institute of Standards and Technology (NIST) announced that it has prepared an initial analysis of hundreds of comments submitted by industry and the public related to the P…
-
Join InCommon Virtual Working Group Meetings, May 20-21
-
May 17, 2013
IAM Online , the monthly webinar series sponsored by InCommon, Internet2, and EDUCAUSE, has scheduled a special series of virtual working group meetings, May 20–21, 2013, to showcase key ide…
-
ED Kicks Off Information Management Week with a Data Privacy Panel
-
May 7, 2013
The U.S. Department of Education's Office of the Chief Privacy Officer kicked off Information Management Week (May 7-9, 2013) with a keynote panel discussion on "Big Data, Small Data, A…
-
Incident Management and Response Checklist
-
May 6, 2013
Rather than waiting for a data breach to happen, consider using an incident checklist to establish a campus incident response team, review your institution's readiness, and develop (or a…
-
What We're Reading, April 2013
-
April 25, 2013
"The 3-D Printing Revolution: Dreams Made Real, One Layer at a Time," Rachel Ehrenberg, Science News 183 (5) (March 9, 2013) http://www.sciencenews.org/view/feature/id/348429/de…
-
Fed. Regs. on Student Identity Verification, State Authorization of Distance Ed. Back on the Radar
-
April 16, 2013
As reported in today's Inside Higher Ed , the U.S. Department of Education (ED) has announced its intent to modify the rule-making effort it originally proposed last year …
-
Who is checking your email?
-
March 12, 2013
What is your campus policy and procedure for access to employee email? If you don't know - or you don't have it written down - it might be time to review your practice, write it down,…
-
Presidential Policy Directive Ties Together "Physical" and "Cyber" Threats
-
February 27, 2013
President Obama has issued a Presidential Policy Directive (PPD-21) on Critical Infrastructure Security and Relience to "advance a national unity of effort to strengthen and maintain sec…
-
NSTIC Pilots at RSA Features Internet2 Scalable Privacy Project
-
February 27, 2013
The following announcement from the National Institute of Standards and Technology (NIST) concerns the pilots funded as part of the President's National Strategy for Trusted Identities in Cy…
-
EDUCAUSE Groups Briefed on ECPA Reform and Its Implications for Higher Education
-
February 11, 2013
As part of Data Privacy Month on January 29, 2013, Greg Nojeim , Senior Counsel at the Center for Democracy & Technology (CDT) and the Director of its Project on Freedom, Security &…
Filter by type
- Blogs [x]
Filter by Publications
Filter by Library Taxonomy
- Cybersecurity [x]
- Policy and Law (92)
- Security Management (89)
- Federal Policy and Law (85)
- Privacy (62)
- Federal Privacy Law (41)
- Cybersecurity Policy (40)
- Identity and Access Management (30)
- Online Privacy (21)
- Campus Policy and Law (17)
- Campus Policies (16)
- Information Technology Management and Leadership (16)
- Identity Management Policy (15)
- Data Privacy (12)
- National Strategy for Trusted Identities in Cyberspace (NSTIC) (12)
- Federated Identity Management (11)
- Security Awareness (11)
- Family Educational Rights and Privacy Act (FERPA) (10)
- Identity Theft (9)
- Privacy Policies (9)
















