-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
- Podcasts (3)
- Blogs (5)
- Articles, Briefs, Papers, and Reports (44)
- Books and Monographs (1)
- Certification, Education, Training and Tutorials (1)
- Effective Practices (2)
- Government Documents, Laws, Testimonies or Reports (3)
- Plans and Guidelines (2)
- Policies and Procedures (45)
- Presentations and Seminars (63)
- Surveys (1)
- Tools (2)
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Security Policies [x]
- Campus Policies (170)
- Campus Policy and Law (170)
- Policy and Law (170)
- Cybersecurity (138)
- Security Management (129)
- Information Technology Management and Leadership (50)
- Data Security (45)
- Security Planning (39)
- Federal Policy and Law (38)
- Security Risk Assessment and Analysis (34)
- Network Security and Applications (31)
- Identity and Access Management (30)
- Cybersecurity Policy (29)
- Incident Handling and Response (28)
- Privacy Policies (23)
- Institutional Management (22)
- Security Awareness (20)
- Privacy (15)
- Security Implementation (15)
EDUCAUSE Library Items for Security Policies
-
Information Security Program Assessment Tool
-
April 15, 2013
This self-assessment tool was created to evaluate the maturity of higher education information security programs using as a framework the International Organization for Standardization (ISO) 2700…
-
Creating an IT Security Baseline
-
April 16, 2013
|
A session at the Security Professionals Conference
The UW–Madison Office of Campus Information Security has worked with the campus community to develop a baseline information systems security standard that's intended to help departments on c…
-
A Practitioner's Approach for Developing Information Security Policy
-
April 17, 2013
|
A session at the Enterprise IT Leadership Conference 2013
An institution developing its information security policy by basing it on lofty ideals and stringent standards may demand far more than its staff is capable of delivering, which risks frustrating s…
-
A Practitioner's Approach for Developing Information Security Policy
-
April 17, 2013
|
A session at the Security Professionals Conference
An institution developing its information security policy by basing it on lofty ideals and stringent standards may demand far more than its staff is capable of delivering, which risks frustrating s…
-
The Enemy Is Us: Doing the Work of Information Security Better
-
April 17, 2013
|
A session at the Security Professionals Conference
Within information security departments, staff often get so bogged down in "getting the job done" that they can never assess how they are doing their job and whether they can do anything …
-
Sensitive Regulated Data: Permitted and Restricted Uses
-
July 18, 2012
The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted us…
-
Virginia Tech Safety and Security Camera Acceptable Use Policy
-
March 23, 2011
This policy addresses the university’s safety and security needs while respecting and preserving individual privacy. This policy addresses th…
-
Texas A&M University Security Surveillance
-
September 15, 2010
This TAMU Standard Administrative Procedure establishes transparent processes and controls for using audiovisual surveillance equipment and any resulting recorded material. …
-
Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices
-
May 17, 2012
|
A session at the Security Professionals Conference 2012
The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are…
-
Protecting the Security of Research Data
-
November 8, 2011
The effective protection and management of research data has become a hot topic in U.S. higher education. Funding agencies increasingly require data management plans as part of grant submittals…

















