Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Colleges | 9 |
Computer Security | 9 |
Privacy | 9 |
Higher Education | 6 |
Information Security | 4 |
Confidential Records | 3 |
Information Management | 3 |
Information Systems | 3 |
Internet | 3 |
Student Records | 3 |
Universities | 3 |
More ▼ |
Source
EDUCAUSE Review | 2 |
CUPA-HR Journal | 1 |
Campus Technology | 1 |
Community College Journal | 1 |
EDUCAUSE Quarterly | 1 |
Education and Information… | 1 |
Author
Anderson, Alicia | 1 |
Corn, Michael | 1 |
Eric G. Pardiñan | 1 |
Grush, Mary | 1 |
Jivulter C. Mangubat | 1 |
Lavagnino, Merri Beth | 1 |
Patton, Madeline | 1 |
Ricson M. Bondad | 1 |
Rosenthal, Jane | 1 |
Sermersheim, Michael D. | 1 |
Williams, Tracy | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 6 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Location
California | 1 |
Illinois | 1 |
Kansas | 1 |
Philippines | 1 |
Rhode Island | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security