Identity Thefthttps://library.educause.edu/topics/policy-and-law/identity-theften{C0B38D95-E66E-4ADB-8B03-45A4F3E72010}https://library.educause.edu/resources/2014/3/columbia-university-administrative-policy-library-computing-and-technologyColumbia University Administrative Policy Library: Computing and TechnologyColumbia University:  Administrative Policy Library Computing and Technology websiteTue, 22 Dec 2015 17:36:26 Z{D6783FE4-03A1-4BF2-8F7F-813B1B816D8E}https://library.educause.edu/resources/2021/10/frequently-asked-questions-about-cyber-insuranceFrequently Asked Questions about Cyber InsuranceThis document contains advice intended for general information only. To learn how cyber insurance applies to your institution, please contact your institution’s risk management office or chief information officer. Wed, 13 Oct 2021 14:48:20 Z{B85D425E-70C8-4620-9DDB-6090C10DAEA8}https://library.educause.edu/resources/2017/8/campus-security-awareness-blogs-2016Campus Security Awareness Blogs, 2016These 12 EDUCAUSE Review "Security Matters" column blog posts are part of the 2016 Campus Security Awareness Campaign. Thu, 31 Aug 2017 21:56:04 Z{5F589416-A71F-4D4F-857D-0231332535B5}https://library.educause.edu/resources/2011/6/identity-management-in-higher-education-2011-reportIdentity Management in Higher Education, 2011 ReportHigher education has made substantial progress in the last five years, but many institutions are still struggling to deliver the full benefits of IdM.Tue, 22 Dec 2015 17:29:05 Z{05D847E4-442E-494A-8D2A-4A4DC24197CF}https://library.educause.edu/resources/2011/6/who-should-get-inWho Should Get In?Tue, 22 Dec 2015 17:30:41 Z{24F99B25-A7CF-4F29-BAAD-106FD2D3B637}https://library.educause.edu/resources/2011/6/identity-management-in-higher-education-2011key-findingsIdentity Management in Higher Education, 2011—Key Findings Citation for this work: Sheehan, Mark C. Identity Management in Higher Education, 2011—Key Findings (Key Findings).Tue, 22 Dec 2015 17:29:06 Z{79E569E8-94FF-4558-A6F9-25F16FE27579}https://library.educause.edu/resources/2011/6/identity-management-in-higher-education-2011roadmapIdentity Management in Higher Education, 2011—Roadmap Citation for this work: Dobbin, Gregory. Identity Management in Higher Education, 2011—Roadmap.Tue, 22 Dec 2015 17:29:07 Z{83D00670-7FB9-49F9-A98C-6BA5EE534DE4}https://library.educause.edu/resources/2011/6/identity-management-in-higher-education-2011-slide-presentationIdentity Management in Higher Education, 2011 - Slide PresentationCitation for this work: Sheehan, Mark C. Identity Management in Higher Education, 2011—Slide Presentation (Slide Presentation 1, 2011).Tue, 22 Dec 2015 17:29:04 Z{534A7674-99E3-4835-9370-00EE92902758}https://library.educause.edu/resources/2010/7/the-use-of-social-security-numbers-in-california-colleges-and-universitiesThe Use of Social Security Numbers in California Colleges and UniversitiesThe author's stated intention was "to minimize both the collection and storage of [the SSN] at colleges anduniversities, given the odds of it being released to unauthorized viewers, by prohibiting the use of all but the last four digits of the SSN and by requiring colleges and universities to discard records and applications after a reasonable period of time if those records contain SSNs along with other pieces of personal information.Tue, 22 Dec 2015 17:26:53 Z{F5D4B328-44F8-4E2D-8A1E-C067975A6066}https://library.educause.edu/resources/2010/1/itrc-breach-report-2009-finalITRC Breach Report 2009 FinalITRC collects information about data breaches made public via reliable media and notification lists from various governmental agencies.Tue, 22 Dec 2015 17:25:40 Z{D588EF30-5534-4FAA-BA99-FC33D64F6103}https://library.educause.edu/resources/2008/10/creating-a-compliance-program-for-identity-theft-rulesCreating a Compliance Program for Identity Theft RulesNew federal regulations to address identity theft go into effect November 1, 2008, and are likely to affect colleges and universities in nuanced ways.Tue, 22 Dec 2015 17:17:31 Z{4DE868BE-B224-445F-ADF2-261BCE269864}https://library.educause.edu/resources/2008/9/ftc-identity-theftFTC Identity TheftThis website is a one-stop national resource to learn about the crime of identity theft. It provides detailed information to help you deter, detect, and defend against identity theft.Tue, 22 Dec 2015 17:17:48 Z{A2D76B2C-941A-491E-ACA3-433EC856423D}https://library.educause.edu/resources/2008/9/ftc-red-flags-ruleFTC Red Flags RuleNACUBO's Resources on how Federal Trade Commission (FTC)'s Red Flags Rule applies to Colleges and Universities as Creditors.Tue, 22 Dec 2015 17:17:49 Z{0078A5D8-C7E6-48CE-99DC-222CD7F29747}https://library.educause.edu/resources/2008/8/information-security-governance-standardizing-the-practice-of-information-securityInformation Security Governance: Standardizing the Practice of Information SecurityThis ECAR research bulletin discusses the trend to use a variety of risk assessment frameworks and standards to create an information security program that is sufficiently comprehensive for colleges and universities.Tue, 22 Dec 2015 17:17:57 Z{1514FCFC-42D7-4ECC-AE7B-68C7F05DFBCB}https://library.educause.edu/resources/2008/7/red-flag-regulations-require-financial-institutions-and-creditors-to-have-identity-theft-prevention-programs"Red Flag" Regulations Require Financial Institutions and Creditors to Have Identity Theft Prevention ProgramsAn FTC announcement that financial institutions and creditors are now required to develop and implement written identity theft prevention programs under the new "Red Flags Rules".Tue, 22 Dec 2015 17:19:21 Z{4B2260C2-265C-4050-97F2-FB8961F41DE1}https://library.educause.edu/resources/2008/5/the-ftc-as-an-educational-partner-in-improving-data-security-and-privacyThe FTC as an Educational Partner in Improving Data Security and PrivacyTue, 22 Dec 2015 17:18:59 Z{19CA3478-5947-40E5-9C95-5EB371FC6186}https://library.educause.edu/resources/2007/11/the-universitys-role-in-advancing-data-encryption-part-2The University's Role in Advancing Data Encryption, Part 2"Identity theft is one of the fastest-growing cyber-crimes, and, as a result, 38 states have identity theft legislation -- with some states using encryption as a safe haven," said Southwestern Illinois Community College CIO Christine Leja.Tue, 22 Dec 2015 17:16:18 Z{C7E4BF67-6895-448F-B077-DE33819436AC}https://library.educause.edu/resources/2007/10/agencies-issue-final-rules-on-identity-theft-red-flags-and-notices-of-address-discrepancyAgencies Issue Final Rules on Identity Theft Red Flags and Notices of Address DiscrepancyThe Federal Trade Commission and the federal financial institution regulatory agencies have sent to the Federal Register for publication final rules on identity theft “red flags” and address discrepancies.Tue, 22 Dec 2015 17:12:44 Z{F5659442-7ECB-4CEF-874B-8E3C6F896FC9}https://library.educause.edu/resources/2007/9/training-your-staff-to-protect-sis-dataTraining Your Staff to Protect SIS Data"No matter how robust your firewall, trained faculty and staff are your first line of defense against system breaches.Tue, 22 Dec 2015 17:16:26 Z{23B713D0-D728-49EC-8473-E27ECCA53CAE}https://library.educause.edu/resources/2017/12/campus-security-awareness-blogs-2017Campus Security Awareness Blogs, 2017These 12 EDUCAUSE Review "Security Matters" column blog posts are part of the 2017 Campus Security Awareness Campaign.Wed, 13 Dec 2017 22:22:30 Z