Tag Archives: IT Compliance

HathiTrust Lawsuit Decision Will Trigger The Law of Unintended Consequences

The HathiTrust lawsuit decision will certainly trigger the law of unintended consequences causing the HathiTrust institutions and all others to regret the suit. That is my conclusion based on my reading of the decision in the lawsuit brought by The Authors Guild … Continue reading

Posted in IT Governance, IT Strategy | Tagged , , , , | 1 Comment

Book Review: Information Security Governance Simplified

Information Security Governance Simplified: From the Boardroom to the Keyboard is a perfect guide to developing effective information security at all levels. The experienced and novice information security professional will find Information Security Governance Simplified, by Todd Fitzgerald, to be a valuable resource and … Continue reading

Posted in IT Risk Management, Reviews | Tagged , , , , , | 3 Comments

Case Study: Arkansas State University Privacy Policy and Web Trackers

This is a case study of the Arkansas State University privacy policy and the prevalence of web trackers on ASU websites. Although this case study is specific to Arkansas State University, the approach and tools used along with the findings … Continue reading

Posted in Case Studies, Privacy | Tagged , , , , , , , , | 3 Comments

Tracking the Trackers on College and University Web Sites

Tracking the trackers on college and university web sites is surprisingly easy and something every CIO, CMO  and compliance officer should be able to do. Here I will offer another layer of insights into how users are tracked on your … Continue reading

Posted in Privacy | Tagged , , , , , , , | Comments Off on Tracking the Trackers on College and University Web Sites

Got Web Beacons, Tracking Cookies or Browser Fingerprinting?

Web beacons, tracking cookies, pixel trackers and browser fingerprinting are used increasingly on college and university web sites. Unfortunately, most CIO’s and Chief Marketing Officers have very little knowledge of these web trackers presences and are naive as to their … Continue reading

Posted in Privacy | Tagged , , , , , , | 8 Comments

Developing an IT Policy Framework

Developing an IT policy framework is the only way to have an effective IT policy model for operations and compliance. In fact, before you do any IT policy work, you should devote some time to defining your enterprise policy framework … Continue reading

Posted in IT Governance | Tagged , , , , | 1 Comment

Credit Card Convenience Fees in Higher Ed

Recently I set out to do a little research into convenience fees for credit cards and other forms of electronic payments in Higher Ed. I wanted to examine the opportunity for CIO’s to adopt alternative payment systems or alternate currencies … Continue reading

Posted in CIO Job | Tagged , , , , , , | 7 Comments

10 Tips for Successful IT Outsourcing

Successful IT outsourcing requires a basic plan to deal with outsourcing vendors wanting to raise prices and renegotiate contracts in 2012. That doesn’t mean you need some fancy planning process or a costly vendor negotiation strategy. You simply need to gather … Continue reading

Posted in IT Outsourcing | Tagged , , , , | Comments Off on 10 Tips for Successful IT Outsourcing

Top 10 Tech Trends 2012 Healthcare vs Higher Education

The Top 10 Tech Trends 2012 from Healthcare Informatics is a stark contrast to the Top 10 Tech Trends for higher education. The comparison of the healthcare top 10 tech trends to those of higher education has greater relevance than … Continue reading

Posted in IT Strategy | Tagged , , , , , | 1 Comment

Revised FERPA Sacrifices Students Privacy

When the FERPA privacy going gets tough, the tough get the privacy laws changed. Or so it seems from reviewing the Revised FERPA rules. What ever happened to the ethos “if it saves one child _______”. Yet, at the very time … Continue reading

Posted in IT Risk Management, Privacy | Tagged , , , | 4 Comments