Other Resources for Cybersecurity

Incident Response Flowchart

May 12, 2017 | iKeepSafe

Incident Response Flowchart

The Incident Response Tool and Flowchart guides administrators through all the steps of incident management: fact-finding, documentation, reporting, engaging the appropriate school officials and other stakeholders, as well as outreach to parents, students, and staff. The Incident Response Tool also helps administrators through the investigation process where they need to ask the right questions to […]

More
360 Self Assessment Tool

May 12, 2017 | iKeepSafe

360 Self Assessment Tool

The Generation Safe 360 Self Assessment tool provides a review of the school’s e-safety competence and helps schools identify their progress in becoming a Generation Safe Gold Medal School. Schools rate their development of and compliance with e-safety policies. It identifies areas of concern and makes recommendations for improved e-safety readiness.

More
2016 Forum Guide to Education Data Privacy

May 12, 2017 | National Center for Education Statistics

2016 Forum Guide to Education Data Privacy

The Forum Guide to Education Data Privacy was developed as a resource for state and local education agencies (SEAs and LEAs) to use in assisting school staff in protecting the confidentiality of student data in instructional and administrative practices. SEAs and LEAs may also find this guide useful in developing privacy programs and related professional […]

More
Understanding Information Security and Privacy in Postsecondary Education Data Systems

May 12, 2017 | Educause

Understanding Information Security and Privacy in Postsecondary Education Data Systems

This paper outlines the information security and privacy challenges that exist within the national postsecondary education data infrastructure. It also introduces key language related to information security and privacy in order to provide a common lexicon to frame data protection discussions, describes the general technology architectures considered in the national postsecondary education data infrastructure, summarizes […]

More
Failed Justifications: Why Privacy and Federalism Do Not Support the Ban on a Federal Unit-Record System

May 12, 2017 | Georgetown Law Journal

Failed Justifications: Why Privacy and Federalism Do Not Support the Ban on a Federal Unit-Record System

This article suggests that the ban on a federal unit-record system cannot be supported by appeals to either privacy or federalism. Because these arguments were not fully developed by the opponents of the unit-record system and were not even explicit in the case of federalism concerns it is useful to consider legal and normative arguments within each […]

More
Data Privacy Issues: Know Your Rights and Responsibilities

May 12, 2017 | The National Association Of College and University Attorneys

Data Privacy Issues: Know Your Rights and Responsibilities

This paper offers a broad overview of the data privacy protection regime, as it applies to institutions of higher education. Part I provides an overview of the U.S. and international data privacy protection framework. Part II offers suggestions regarding ensuring compliance and minimizing risk of data breach. Finally, Part III provides some guidelines for handling […]

More
The Higher Education CPO Primer, Part 1

May 12, 2017 | Educause

The Higher Education CPO Primer, Part 1

The Higher Education Chief Privacy Officers Working Group has created this resource to serve as a welcome kit for CPOs in higher education. The CPO Primer is intended to provide an overview and introductory body of knowledge to help new CPOs (or those new to higher education) better understand their job and the challenges unique […]

More
College And University Data Breaches: Regulating Higher Education Cybersecurity Under State And Federal Law

May 11, 2017 | Journal of College and University Law

College And University Data Breaches: Regulating Higher Education Cybersecurity Under State And Federal Law

This article discusses the types of breaches commonly faced by higher education institutions and what steps these institutions can take to limit liability and properly respond to potential litigation. Part I will address how data breaches occur, and Part II will outline what kind of data breaches commonly affect colleges and universities, including examples of colleges and […]

More
Balancing Student Privacy, Campus Security, and Public Safety: Issues for Campus Leaders

May 11, 2017 | American Association of State Colleges and Universities

Balancing Student Privacy, Campus Security, and Public Safety: Issues for Campus Leaders

The purpose of this paper is twofold: to provide background information on student privacy and campus security, and to review best practices that college and university leaders may consider to help ensure that a system is in place to simultaneously maximize an open community and manage public safety preparedness and responsiveness. It is also intended […]

More
Big Data in the Campus Landscape

May 11, 2017 | EDUCAUSE

Big Data in the Campus Landscape

This paper is a publication of the ECAR Campus Cyberinfrastructure (ECAR-CCI) Working Group. It is the third paper in a four-part series focusing on Big Data in the Campus Landscape. ECAR working groups bring together higher education IT leaders to address core technology challenges. Individuals at EDUCAUSE member institutions are invited to collaborate on projects […]

More