Skip to Main Content

Legalities Governing Information Security in Higher Education: References

References

Alexi, E. (2008) The Law Requires Email Archiving. IT World. Retrieved on
4/20/09 from http://www.itworld.com/security/55954/law-requires-emailarchiving


Cassat, P. – Salamon, K. – Thibeau, B. (2003) IT Security for Higher Education:
A Legal Perspective. EDUCAUSE/Internet2 Computer and Network Security
Task Force. Retrieved on 4/20/09 from
http://net.educause.edu/ir/library/pdf/CSD2746.pdf


Caruso, J. (2006) Safeguarding the Tower: IT Security in Higher Education
2006. EDUCAUSE Center for Applied Research – ECAR Key Findings. Retrieved
on 4/20/09 from
http://net.educause.edu/ir/library/pdf/ecar_so/ers/ers0606/Ekf0606.pdf


Crews, K. (2009) The TEACH Act and some Frequently Asked Questions.
American Library Association. Retrieved on 4/20/09 from
http://www.ala.org/ala/aboutala/offices/wo/woissues/copyrightb/federallegisla
tion/distanceed/teachfaq.cfm


Fischman, J. (2008) Harvard Security Breach Exposes Sensitive Student Data.
The Chronicle Of Higher Education, The Wired Campus Retrieved on 4/20/09
from http://chronicle.com/wiredcampus/article/2815/harvard-security-breachexposes-
sensitive-student-data


Harris, M. Lowendahl, J. Zastrocky, M. (2006) Best Practices for Justifying and
Allocating Higher Education Security Resources. Gartner Research Retrieved on
4/20/09 from
http://confluence.arizona.edu/confluence/download/attachments/2461798/best
_practices_for_higher_ed_security_resources.pdf


Kenigsberg, N. - McMillan, M. - Scaraglino, P. - Sitko, T. (2003). Life with
HIPAA. Educause Center for Applied Research. Volume 2003, Issue 7 Retrieved
on 4/20/09 from http://net.educause.edu/ir/library/pdf/ERB0307.pdf


Mortman, D. (2009) HIPAA compliance: New regulations change the game.
TechTarget, SearchSecurity.com Retrieved on 4/20/09 from
http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1352102,00.html#


Oblinger, D . (2003). Computer and Network Security and Higher Education’s
Core Values. EDUCAUSE Center for Applied Research, Volume 2003, Issue 6.
Retrieved on 4/20/09 from
http://net.educause.edu/ir/library/pdf/ERB0306.pdf


Olsen, F. (2003) Demands of Homeland Security Will Pressure Colleges, Campus
Computing Experts Warn. The Chronicle of Higher Education. Retrieved on
4/20/09 from http://chronicle.com/free/2003/01/2003011702t.htm


Phillip, Abbey (2008) After Security Breach, Harvard Unveils New IDs. The
Harvard Crimson. Retrieved on 4/20/09 from
http://www.thecrimson.com/article.aspx?ref=523934


Redden, E. (2007) Fuzzy Understandings of FERPA. Inside Higher ED. Retrieved
on 4/20/09 from http://www.insidehighered.com/news/2007/06/14/vt


Shaul, J. (2008) Data Security and Higher Education. SC Magazine US.
Retrieved on 4/20/09 from http://www.scmagazineus.com/Data-security-andhigher-
education/article/112517/


Shiley, C. (2003) Putting the Rights into the Family Education Rights and Privacy
Act: Enforcement and the Privacy Right of Action. Department of Political
Science, MIT Retrieved on 4/20/09 from
http://stuff.mit.edu/people/cshiley/Thesis/DANCE-DANCE-FERPA.pdf


State of Florida (2008) The 2008 Florida Statutes, 1002.22 Student records and
reports; rights of parents and students; notification; penalty. Online Sunshine
Retrieved on 4/20/09 from
http://www.leg.state.fl.us/Statutes/index.cfm?App_mode=Display_Statute&Sea
rch_String=&URL=Ch1002/SEC22.HTM&Title=->2004->Ch1002-
>Section%2022#1002.22


Unknown (2008) Levels of data security at Yale. Information Technology
Services. Retrieved on 4/20/09 from http://www.yale.edu/its/securecomputing/
data/levels/index.html


Vogel, V. (2008) Network and Host Security Implementation (Stage 2).
Computer and Network Security Task Force, Educause, Internet2. Retrieved on
4/20/09 from
https://wiki.internet2.edu/confluence/display/secguide/Network+and+Host+Se
curity+Implementation+(Stage+2)


Young, J. (2008) Digital Intruders Hack Into Harvard Web Site and Publish
Private Information. The Chronicle of Higher Education, The Wired Campus
Retrieved on 4/20/09 from
http://chronicle.com/wiredcampus/article/?id=2760