Category Archives: Privacy

Cyber Security Awareness Month Planning

National Cyber Security Awareness Month is fast approaching and every CIO and CSO should already have their Cyber Security Awareness Month planning well underway. Just in case you haven’t begun your planning or you simply decided to dust off the … Continue reading

Posted in CIO Job, Privacy | Tagged , | Comments Off on Cyber Security Awareness Month Planning

Geotagging and Location Based Services Privacy Concerns

Geotagging and location based services are exploding and universities must address the privacy and security issues in their mobile computing strategies. Additionally, colleges and universities should take deliberate steps to help students and their employees better understand how to manage the … Continue reading

Posted in Privacy | Tagged , , , , , | 1 Comment

Case Study: Arkansas State University Privacy Policy and Web Trackers

This is a case study of the Arkansas State University privacy policy and the prevalence of web trackers on ASU websites. Although this case study is specific to Arkansas State University, the approach and tools used along with the findings … Continue reading

Posted in Case Studies, Privacy | Tagged , , , , , , , , | 3 Comments

Tracking the Trackers on College and University Web Sites

Tracking the trackers on college and university web sites is surprisingly easy and something every CIO, CMO  and compliance officer should be able to do. Here I will offer another layer of insights into how users are tracked on your … Continue reading

Posted in Privacy | Tagged , , , , , , , | Comments Off on Tracking the Trackers on College and University Web Sites

Facebook Like Button Violates University Privacy Policy

The Facebook Like button is on so many college or university websites even when the Facebook Like button violates most every college and university privacy policy. I realize your chief marketing officer, foundation director and director of alumni relations love the … Continue reading

Posted in Privacy | Tagged , , , , , , | 5 Comments

Got Web Beacons, Tracking Cookies or Browser Fingerprinting?

Web beacons, tracking cookies, pixel trackers and browser fingerprinting are used increasingly on college and university web sites. Unfortunately, most CIO’s and Chief Marketing Officers have very little knowledge of these web trackers presences and are naive as to their … Continue reading

Posted in Privacy | Tagged , , , , , , | 8 Comments

Outsourced University Athletics Websites Violate University Privacy Policy

Outsourced university athletics websites violate university privacy policy including tracking visitor data and using it for advertisers. I don’t want to over complicate this so let me offer the simplest explanation of how university privacy policy are being violated. University athletic … Continue reading

Posted in CIO Job, Privacy | Tagged , , , , | 2 Comments

Behavioral Analytics: Politics and Technology of Hoodies and Profiling

Behavioral analytics and social media analytics technology is outpacing the policies and politics of hoodies and behavioral profiling. This is the long standing issue of what is IT’s role in administering acceptable use, crime prevention and the use of technology … Continue reading

Posted in IT Governance, IT Risk Management, Privacy | Tagged , , , , | Comments Off on Behavioral Analytics: Politics and Technology of Hoodies and Profiling

March Madness of Higher Education Data Breaches

In honor of March Madness the folks at Application Security, Inc have released the Second Annual Higher Education Data Breach Madness Brackets. This is a fun look at the serious issue of higher education data breaches using brackets to create … Continue reading

Posted in IT Risk Management, Privacy | Tagged , , | 4 Comments

Revised FERPA Sacrifices Students Privacy

When the FERPA privacy going gets tough, the tough get the privacy laws changed. Or so it seems from reviewing the Revised FERPA rules. What ever happened to the ethos “if it saves one child _______”. Yet, at the very time … Continue reading

Posted in IT Risk Management, Privacy | Tagged , , , | 4 Comments