Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Last reviewed: February 2015June 2017

A common information security issue across college and university campuses is how to engage faculty in good security practices to protect university sensitive institutional data. In many cases, this is an issue because faculty do not see information security as relevant to their role in higher education. This - , and other misconceptions about information security in the faculty space - , can be a huge hurdle to jump for information security practitionersand privacy professionals.

Below are some guidelines in FAQ format on how to work with faculty to understand and mitigate the risks to university sensitive data in the realm of academia.

...

  • Data breaches can impact colleges and universities financially; possibly resulting in the loss of donations.
  • Data breaches can happen in the academic space. Faculty can reduce this risk by preventing loss of data and not waiting until a mistake occurs to learn prevention techniques.
  • Protecting data is a collaborative effort between faculty and staff.
  • Student information is considered confidential and needs to be protected by anyone accessing or using it for academic purposes.
  • Federal laws such as HIPAA (Health Insurance Portability and Accountability Act), FERPA (Family Educational Rights and Privacy Act), GLBA (Gramm-Leach-Bliley Act), and the HITECH (Health Information Technology for Economic and Clinical Health) Acts all have requirements regarding the protection of specific categories of data.
  • To date, 47 48 states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands all have state breach notification laws. It is the responsibility of each college and university to adhere the laws that affect their student population.

...

  • Establish a list of departmental representatives for each college and meet with them on a regular basis to discuss hot topics, alerts and issues of concern.
  • Establish a relationship with a technical representative from each college and meet with them regularly to discuss hot topics, alerts and best practices.
  • Work with department representatives in order to make information security a part of traditional business processes (i.e., purchasing, grant applications, applications for research projects). Making information security a part of the checklist in completing these processes will generate and retain relationships with this group.
Additional Resources

...

(question) Questions or comments? (info) Contact us.

...