We hope to see you at the AACRAO Technology Conference in Baltimore, July 10–12.
From the Conference Coordinator:
I look forward to seeing some of the readers of SecureU at the AACRAO Technology Conference in Baltimore next week. A number of the conference sessions focus on privacy and security. For example:
- a plenary session by LeRoy Rooker, the Director of the Family Policy Compliance Office of the U.S. Department of Education;
- a session by Rodney Petersen, the Educause Security Task Force Coordinator;
- a session entitled, "Opportunities and Efficiencies: Supporting Student Services with Federated Identity"; and,
- a Round Table on Identity Management.
The conference program also includes several sessions on the community-source Kuali Student System, sessions on electronic data exchange, technology management, CRM, workflow, and many more topics.
In addition, a workshop on Identity Management, co-sponsored by Educause and Internet2, takes place July 9 and 10 before the official start of the conference.
Safe travels to those of you who will be attending, and a happy Fourth of July holiday!
—Jeffrey von Munkwitz-Smith, Coordinator of the AACRAO Technology Conference
In this Issue
Heightened Security Urged for Mass. Colleges
Rise in Tornadoes, Floods Poses Risk to Colleges
- The majority of Massachusetts public colleges and universities have not installed security cameras, hired armed police forces, or trained faculty and staff to spot dangerous students and workers, according to a report that says... | Read more >
Texas Court's Ruling in Bonfire Case Opens New Liability Worries for Campuses
- A recent government report suggesting that extreme weather will be more common in the future raises questions on how climate change impacts colleges and universities. Many educational institutions are revising their disaster... | Read more >
Businesses and Universities to Be Advised to Secure Chemicals
- A Texas court recently permitted a negligence lawsuit to continue against 12 former Texas A&M University administrators, raising many questions in the higher-education community about whether campus officials can be held liable... | Read more >
Video Gives Tips for Surviving Campus Attacks
- The federal government is warning 7,000 businesses, including universities, chemical plants, food processing centers, and hospitals, that they are at an increased risk of being attacked by terrorists because they contain... | Read more >
DVD Published on Training for Campus Shootings
- While there has been much discussion over campus security procedures, students have not always received sufficient training in what exactly they should do if there is a shooter on their campus. In an effort to prepare students... | Read more >
Colleges Turn to Access Control
- Approximately 50 colleges have placed orders for "Shots Fired on Campus," an instructional DVD from a Spokane, Wash., company that should be available by late June. Several hundred more colleges will likely order the DVD,... | Read more >
Creighton University Devises Master Security Plan
- Colleges increasingly are turning to "one-card" solutions to monitor access to dorms and academic buildings. At Hamden, Conn.-based Quinnipiac University, the card serves as the student's identification card, meal ticket,... | Read more >
Security Upgraded at Napier University in England
- Creighton University in Omaha, Neb., recently devised a master security plan for the campus. A half-dozen leading stakeholders got involved with the plan for the 8,700-member university: information-technology security, physical... | Read more >
Historic Building Revived by Wayne State University Force
- Napier University in Edinburgh, England, recently received a comprehensive electronic security upgrade. The school has four main campuses and five smaller locations. The upgrade was designed to integrate each of the campuses'... | Read more >
- Police officers at Wayne State University in Detroit are turning a historic building into their new headquarters, which will offer improved security. The 33,000-square-foot facility boasts a high-tech dispatch center with 14... | Read more >
Increase in Stolen Laptops Endangers Data Security
Information at Thieves' Fingertips
- Colleges across the country are taking action to protect the confidential information of students and faculty, as there have already been at least six college security breaches involving laptops this year. The theft of a laptop... | Read more >
Managing the Data Loss Crisis
- The New York State Cyber Security Conference recently hosted cyber security experts who demonstrated some of today's biggest cyber security threats. University of Albany professor Sanjay Goel and a team of researchers... | Read more >
University of Virginia Boosting Computer Security System
- Damage to U.S. companies, universities, and consumers from data loss and theft is estimated to be more than $56.6 billion and growing. More than 75 percent of organizations reported high-tech security breaches, and more than 25... | Read more >
Dartmouth Launches Network Security Study
- The University of Virginia recently overhauled its computer security system after one of its laptops was stolen and data belonging to thousands of students, faculty, and staff was exposed. The university is now eliminating... | Read more >
Southern Connecticut State University Addresses Hacker Scare
- Dartmouth College's Dartmouth's Institute for Security Technology Studies will develop and evaluate current sensing methods for monitoring the multiple wireless networks at Dartmouth to gather real-time data. Researchers hope... | Read more >
- Southern Connecticut State University (SCSU) was quick to respond following a security breach of its computer network After discovering that the private information of students and alumni had been accessed by hackers, SCSU... | Read more >
SecureU is a monthly service for AACRAO members. If you are not a member and would like to receive a complimentary 3-month subscription, visit the
Abstract News © 2007 Information, Inc. All rights reserved. No parts
of this site may be reproduced in any form including information storage and retrieval systems without prior written permission.