Main Nav

Search results

Showing 41 - 50 of 530 Results

Sort by:

Amassing Student Data and Dissipating Privacy Rights
January 28, 2013

Marc Rotenberg is Executive Director of the Electronic Privacy Information Center (EPIC) in Washington, D.C. He teaches Information Privacy Law at Georgetown University Law Center. Khali…

Data Privacy Day 2013 Event
January 28, 2013

The National Cyber Security Alliance (NCSA), a non-profit public-private partnership focused on helping all digital citizens stay safer and more secure online, kicked off Data Privacy Day 2013 wi…

Data Classification, Security, and Compliance: Helping Users Help Themselves
January 28, 2013

Key Takeaways Being able to accurately identify, manage, and secure data is imperative in an era where every sector, higher education included, is data-driven. The goal of d…

Location, Location, Location
January 30, 2014 | A session at the EDUCAUSE LIVE! - Location, Location, Location

Two contradicting federal court decisions in December 2013 focus on whether the National Security Agency's massive data collection program is constitutional because it does not probe into th…

Cloud Security Debate: Cloud Now or Cloud How?
December 10, 2012

During the often-fiery 2012 presidential debate season, a lively debate of a different sort held at Indiana University (IU) featured passionate arguments on the natur…

Joint AAU/COGR Letter on FAR FISMA Rule
October 18, 2012

This October 18, 2012 letter from the Association af American Universities (AAU) and the Council on Governmental Relations (COGR) sent to the U.S. General Services Administration (GSA) is a respo…

Sensitive Regulated Data: Permitted and Restricted Uses
April 2, 2013

The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted us…

Can Big Data Help Universities Tackle Security, BYOD?
July 31, 2012

Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…

Policy Implications of Big Data and Analytics
August 13, 2012

EDUCAUSE Policy recently asked association representatives from ACE, AACC, NACUBO, AASCU, and NAICU what they think are the policy implications that arise with the increased use of big…

For BYOD Best Practices, Secure Data, Not Devices
July 17, 2012

Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

Close
Close


Connect: San Antonio
April 22–24
Register Now

Events for all Levels and Interests

Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.

Close

Digital Badges
Member recognition effort
Earn yours >

Career Center


Leadership and Management Programs

EDUCAUSE Institute
Project Management

 

 

Jump Start Your Career Growth

Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.

 

Close
EDUCAUSE organizes its efforts around three IT Focus Areas

 

 

Join These Programs If Your Focus Is

Close

Get on the Higher Ed IT Map

Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
 

 

Close

2015 Strategic Priorities

  • Building the Profession
  • IT as a Game Changer
  • Foundations


Learn More >

Uncommon Thinking for the Common Good™

EDUCAUSE is the foremost community of higher education IT leaders and professionals.