Educause Security Discussion mailing list archives
Privacy Implications of using Student Photos
From: Anand S Malwade <Anand.Malwade () SHU EDU>
Date: Tue, 15 Dec 2009 17:08:22 -0500
I was curious to know what position other Universities have regarding the posting of Student photos on a web application that can be accessed by faculty and other students. Is an Opt out policy mandatory ? if there any FERPA or other privacy guidelines around the same ? Thanks, Anand -----Original Message----- From: The EDUCAUSE Security Constituent Group Listserv [mailto:SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Howell, Paul Sent: Sunday, December 13, 2009 6:21 PM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] Models for Effectively Operating in Highly Decentralized Environments Hi Chris, The topic of centralized vs. decentralized IT environments is a common topic for many of us. Did you get many comments on your message? If you did receive comments, would you mind summarizing them for us? The effective practices working group (part of the Educause security task force) discussed your question this week, which triggered an interesting conversation. We're all facing budget pressures (some much worse than others) and how we deal with becoming more efficient such that our IT spend rates are reduced varies. Some schools see further decentralization by moving some functions and people to other areas as a means to reduce costs, while others are moving to a more centralized model to also reduce costs. Both approaches can be beneficial, particularly when they align to the desired direction of the academy. How does responding to the budget pressures affect your security program? Are you considering consolidating security functions and teams in a core team to enable efficiency, or are you distributing security functions and staffs out into other area thereby reducing the size of the central security team? Cordially, Paul Howell Chief Information Technology Security Officer The University of Michigan (O) 734-763-0609 (C) 734-996-8008 -----Original Message----- Subject: Models for Effectively Operating in Highly Decentralized Environments From: Chris Kidd <chris.kidd () UTAH EDU> Reply-To: The EDUCAUSE Security Constituent Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU> Date: Wed, 11 Nov 2009 09:54:23 -0700 We're working with some of our colleges to better coordinate security efforts. How have you effectively integrated security into academic and research environments, particularly Colleges that are extremely decentralized and where the ownership of IT resources are fiercely defended as "mine"? Thanks, Chris Chris Kidd 650 Komas Drive, Suite 102 Salt Lake City, UT 84108 Office: 801.587.9241 Cell: 801.747.9028 chris.kidd () utah edu http://www.secureit.utah.edu
Current thread:
- Privacy Implications of using Student Photos Anand S Malwade (Dec 15)
- <Possible follow-ups>
- Re: Privacy Implications of using Student Photos Bob Bayn (Dec 15)
- Re: Privacy Implications of using Student Photos Chris Kidd (Dec 15)
- Re: Privacy Implications of using Student Photos Brad Judy (Dec 15)