EDUCAUSE | Blogs http://www.educause.edu/blogs en EDUCAUSE | Blogs http://www.educause.edu/blogs http://www.educause.edu/sites/all/themes/educause/images/e_rss.png The CIO Pipeline, Part 2: Infusing Academics into the Pipeline http://www.educause.edu/blogs/bdvoss/cio-pipeline-part-2-infusing-academics-pipeline <p><em style="line-height: 1.4em;">This is the second in a three-post series related to the CIO Pipeline Challenge. Part 1 raised the potential of a &#8220;fracturing&#8221; of the CIO role into component parts (strategist and plumber), and Part 3 will address the need for a different view of &#8220;plumbers and plumbing.&#8221;</em></p><p><a href="http://www.educause.edu/blogs/bdvoss/cio-pipeline-part-2-infusing-academics-pipeline" target="_blank">read more</a></p> Fri, 18 Apr 2014 18:38:20 +0000 310246 at http://www.educause.edu Interview: Yves Paul Epelboin, Universite Pierre et Marie Curie http://www.educause.edu/blogs/gbayne/interview-yves-paul-epelboin-universite-pierre-et-marie-curie <p>Yves Paul Epelboin is special advisor to the President for MOOC at&#160;Universite Pierre et Marie Curie. In this interview he discusses their approach to MOOCs and higher education in France.</p><p><a href="http://www.educause.edu/blogs/gbayne/interview-yves-paul-epelboin-universite-pierre-et-marie-curie" target="_blank">read more</a></p> 9:49 Yves Paul Epelboin is special advisor to the President for MOOC at&#160;Universite Pierre et Marie Curie. In this interview he discusses their approach to MOOCs and higher education in France. Yves Paul Epelboin is special advisor to the President for MOOC at&#160;Universite Pierre et Marie Curie. In this interview he discusses their approach to MOOCs and higher education in France. Wed, 16 Apr 2014 14:44:43 +0000 310173 at http://www.educause.edu The Flinch and Other Traps http://www.educause.edu/blogs/accidentalcio/flinch-and-other-traps <p>Everything that IT leaders do involves a negotiation in one way or another. Yet, focusing on negotiation skills is one of the last things we do when thinking about the professional development needs of our organizations.<br /> <br /> Once, while thumbing through a magazine on a cross-country flight, I noticed an advertisement featuring a very distinguished-looking gentleman named Chester Karrass, whose testimonial stated, &#8220;In business as in life, you don&#8217;t get what you deserve; you get what you negotiate.&#8221; Seeing this ad several times before, I decided &#8220;why not&#8221; and signed up for a Karrass negotiating seminar. While the content of the workshop was predominantly focused on buying and selling, what stuck with me was how applicable it was to the negotiations regarding the expectations and resources that IT leaders face every day.<br /> </p><p><a href="http://www.educause.edu/blogs/accidentalcio/flinch-and-other-traps" target="_blank">read more</a></p> Tue, 15 Apr 2014 00:19:29 +0000 310125 at http://www.educause.edu Quick Takes - Cybersecurity Updates http://www.educause.edu/blogs/jen-ortega/quick-takes-cybersecurity-updates <div> <div style="font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 13px; line-height: normal;"> <p style="padding: 0px; margin-bottom: 0px;"><span mce_style="font-family: verdana, geneva;" style="font-family: verdana, geneva;">The Department of Homeland Security&#39;s (DHS) Integrated Task Force has been disbanded after completing the&#160;<a href="http://www.dhs.gov/national-infrastructure-protection-plan" target="_blank" title="National Infrastructure Protection Plan">National Infrastructure Protection Plan</a>&#160;(NIPP). Remaining functions of the task force were transitioned to their DHS components. The task force was originally created to raise security and resilience among the nation&#39;s critical infrastructure operators and owners. The plan outlines how government and critical infrastructure owners in&#160;the private sector&#160;can work together to manage cyber risks and secure critical infrastructure.&#160;</span></p></div></div><p><a href="http://www.educause.edu/blogs/jen-ortega/quick-takes-cybersecurity-updates" target="_blank">read more</a></p> Mon, 24 Mar 2014 16:33:47 +0000 309374 at http://www.educause.edu Podcast: Bruce Maas on the Role of the CISO http://www.educause.edu/blogs/gbayne/podcast-bruce-maas-role-ciso <p dir="ltr" style="line-height:1.15;margin-top:0pt;margin-bottom:0pt;margin-left: 36pt;">&#160;</p><p dir="ltr" style="line-height:1.15;margin-top:0pt;margin-bottom:0pt;margin-left: 36pt;">&#160;</p><p dir="ltr" style="line-height:1.15;margin-top:0pt;margin-bottom:0pt;margin-left: 36pt;"><span id="docs-internal-guid-833c6d6e-e687-946a-e232-9f0d8e9948d9"><span style="font-size: 15px; font-family: Arial; background-color: transparent; vertical-align: baseline; white-space: pre-wrap;">Bruce Maas, CIO for the University of Wisconson&#8211;Madison, discusses the evolution of the CISO role.<span class="Apple-tab-span" style="white-space:pre;"> </span></span></span></p><div>&#160;</div><p><a href="http://www.educause.edu/blogs/gbayne/podcast-bruce-maas-role-ciso" target="_blank">read more</a></p> 19:57 &#160; &#160; Bruce Maas, CIO for the University of Wisconson&#8211;Madison, discusses the evolution of the CISO role. &#160; &#160; &#160; Bruce Maas, CIO for the University of Wisconson&#8211;Madison, discusses the evolution of the CISO role. &#160; Fri, 21 Mar 2014 21:05:43 +0000 309359 at http://www.educause.edu ED OIG Drops Tech Fixes for Identity Verification in Latest Report http://www.educause.edu/blogs/jcummings/ed-oig-drops-tech-fixes-identity-verification-latest-report <p class="smoky"><em><span style="line-height: 1.4em;">Summary: In its latest report on financial aid fraud in distance education, the U.S. Department of Education (ED) Office of the Inspector General (OIG) dropped previously proposed technology-based measures for student identity verification that EDUCAUSE considered problematic. The OIG now recommends enhanced admissions documentation to address identity verification concerns, which seems much more manageable within existing institutional systems and processes. However, the OIG continues to advocate for changes in the financial aid need calculation for distance learners as well as maintenance of a standard for determining the last date of attendance for the return of federal student aid funds that could damage online distance education.</span></em></p><p><a href="http://www.educause.edu/blogs/jcummings/ed-oig-drops-tech-fixes-identity-verification-latest-report" target="_blank">read more</a></p> Fri, 21 Mar 2014 19:48:20 +0000 309353 at http://www.educause.edu NIH Notice: Network Restriction on Pornography http://www.educause.edu/blogs/jcummings/nih-notice-network-restriction-pornography <p class="smoky"><em><span style="line-height: 1.4em;">Summary: NIH released a notice alerting award recipients of a new restriction on the use of funds &#8220;to maintain or establish computer network&#8221; unless that network blocks access to pornography. NIH interprets the provision as applying only to funds awarded directly for such purposes; overhead funds are not involved. That essentially restricts NIH&#8217;s application of the provision to project-based networks, removing the concern that any institution receiving NIH funds might have to implement blocking or filtering across its campus network. Researchers with potentially impacted projects should consider discussing their concerns with their NIH grants and contracts officer.</span></em></p><p><a href="http://www.educause.edu/blogs/jcummings/nih-notice-network-restriction-pornography" target="_blank">read more</a></p> Fri, 21 Mar 2014 19:38:58 +0000 309350 at http://www.educause.edu Department of Education Addresses Gainful Employment Standards at For-Profit Institutions http://www.educause.edu/blogs/jen-ortega/department-education-addresses-gainful-employment-standards-profit-institutions <p>On Friday, March 14, the <a href="http://www.ed.gov/news/press-releases/obama-administration-takes-action-protect-americans-predatory-poor-performing-ca">Department of Education announced</a> the release of a proposed rule containing the <a href="http://www2.ed.gov/policy/highered/reg/hearulemaking/2012/notice-proposed-rulemaking-march-14-2014.pdf">&#8220;gainful employment&#8221; standards</a> for vocational programs at for-profit institutions and community colleges. The 841-page proposal would require career colleges to meet certain standards for gainful employment or risk losing access to federal student aid. The goal of the rule, as stated by the Obama administration, is to ensure the programs are preparing students to obtain jobs where they can earn enough money to pay back their loans.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/department-education-addresses-gainful-employment-standards-profit-institutions" target="_blank">read more</a></p> Thu, 20 Mar 2014 23:42:04 +0000 309311 at http://www.educause.edu ED and Higher Education Associations Look to Address Distance Education Regulations http://www.educause.edu/blogs/jen-ortega/ed-and-higher-education-associations-look-address-distance-education-regulations <p>On February 19, a 15-person negotiated rulemaking panel appointed by the U.S. Department of Education (ED) met to begin discussing a variety of issues concerning federal student aid regulations, including how a program or institution can apply or qualify for federal student aid programs and how to better protect such programs from fraud and abuse. The panel consists of representatives from for-profit institutions, community colleges, and other relevant stakeholders. It will address &#8220;state authorization&#8221; for distance education providers seeking to participate in Title VI and other Higher Education Act student aid programs. As explained in the <a href="http://www2.ed.gov/policy/highered/reg/hearulemaking/2012/pii-issue2-distance2014.pdf">issue paper</a> released by ED, the agency is seeking input on how state reciprocity agreements should be used in conjunction with the new regulations.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/ed-and-higher-education-associations-look-address-distance-education-regulations" target="_blank">read more</a></p> Thu, 20 Mar 2014 23:33:03 +0000 309310 at http://www.educause.edu Staying “Plugged In” http://www.educause.edu/blogs/dianao/staying-plugged-in <p>In the <a href="http://www.educause.edu/ero/educause-review-print-edition-volume-49-number-2-marchapril-2014">March/April 2014 <em>EDUCAUSE Review</em></a><em>,</em> Susan Grajek and the members of the 2013&#8211;2014 EDUCAUSE IT Issues Panel outline <a href="http://www.educause.edu/ero/article/top-ten-it-issues-2014-be-change-you-see">this year&#8217;s top-ten IT issues</a> for colleges and universities. Their descriptions of the issues are clear and their recommendations highly useful. Campus IT leaders and staff must focus on the present&#8212;but they must also stay &#8220;plugged in&#8221; in order to anticipate the future and be ready for whatever comes next.</p><p><a href="http://www.educause.edu/blogs/dianao/staying-plugged-in" target="_blank">read more</a></p> Thu, 20 Mar 2014 21:20:28 +0000 309299 at http://www.educause.edu Two K-12 Grantees Recently Featured on Getting Smart blog http://www.educause.edu/blogs/kristidepaul/two-k-12-grantees-recently-featured-getting-smart-blog <p style="margin-top: 1.5em; margin-bottom: 1.5em; font-size: 0.875em; color: rgb(76, 76, 76); font-family: Helvetica, Arial, 'Nimbus Sans L', sans-serif; line-height: 21px;">At first glance, Piedmont City Schools in rural Alabama and New York City&#8217;s Brooklyn Laboratory Charter School may not appear to have much in common. The former is a rural district working to bring its students into the 21st century in the Deep South; the other, a brand new charter school in the heart of New York City. Their student populations differ greatly. Each of the schools face varying economic, cultural and technological challenges, and the models that educators are implementing do not exactly overlap.</p><p><a href="http://www.educause.edu/blogs/kristidepaul/two-k-12-grantees-recently-featured-getting-smart-blog" target="_blank">read more</a></p> Thu, 13 Mar 2014 06:00:00 +0000 309122 at http://www.educause.edu The CIO Pipeline, Part 1: The Strategist vs. the Plumber Revisited http://www.educause.edu/blogs/bdvoss/cio-pipeline-part-1-strategist-vs-plumber-revisited <p><em style="line-height: 1.4em;">This will be the first in a three-post series related to the CIO Pipeline Challenge. Part 2 will address the need to broaden CIO recruitment into the &#8220;strategist&#8221; pipeline, and Part 3 will address the need to take a different view of &#8220;plumbers and plumbing.&#8221;</em></p><p><a href="http://www.educause.edu/blogs/bdvoss/cio-pipeline-part-1-strategist-vs-plumber-revisited" target="_blank">read more</a></p> Wed, 12 Mar 2014 18:21:54 +0000 308835 at http://www.educause.edu Purposefully Repurposed: College for America Converts a CRM Tool Into a Learner-Centered LMS http://www.educause.edu/blogs/millichap/purposefully-repurposed-college-america-converts-crm-tool-learner-centered-lms <p style="margin-top: 1.5em; margin-bottom: 1.5em; font-size: 0.875em; color: rgb(76, 76, 76); font-family: Helvetica, Arial, 'Nimbus Sans L', sans-serif; line-height: 21px;">Readers of NGLC&#8217;s blog are no strangers to Southern New Hampshire University&#8217;s College for America (CfA), the remarkably innovative competency-based degree program supported by NGLC that, in spring 2013, became the first such program in the nation to win authorization to offer federal financial aid not tied to the credit hour. This unprecedented development brought SNHU media attention from many corners, up to and including the New York Times. Behind a departure like this lie many individual smaller breaks with conventional processes and approaches. In and of themselves, these changes may not be media magnets, yet they constitute vital components of the breakthrough.</p><p><a href="http://www.educause.edu/blogs/millichap/purposefully-repurposed-college-america-converts-crm-tool-learner-centered-lms" target="_blank">read more</a></p> Wed, 05 Mar 2014 18:23:55 +0000 308245 at http://www.educause.edu EDUCAUSE Submits Letter to the FCC to Protect the Open Internet http://www.educause.edu/blogs/jen-ortega/educause-submits-letter-fcc-protect-open-internet <p>On February 25, EDUCAUSE, the Association of Research Libraries (ARL), and the American Library Association (ALA) submitted comments to the <a href="http://www.fcc.gov/">Federal Communications Commission</a>&#160; regarding the Agency&#8217;s possible actions in response to the <a href="http://www.cadc.uscourts.gov/internet/opinions.nsf/3AF8B4D938CDEEA685257C6000532062/$file/11-1355-1474943.pdf"><em>Verizon v FCC</em> decision</a> issued by the U.S. Court of Appeals for the D.C. Circuit.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/educause-submits-letter-fcc-protect-open-internet" target="_blank">read more</a></p> Fri, 28 Feb 2014 19:52:12 +0000 307876 at http://www.educause.edu The Boyfriend Dilemma: Are You Giving Up Too Much Personal Information? http://www.educause.edu/blogs/vvogel/boyfriend-dilemma-are-you-giving-too-much-personal-information <p>Guest Bloggers: <a href="http://www.educause.edu/members/lisa-c-ho">Lisa Ho</a>, Matt Wolf, and Erika Donald, University of California, Berkeley</p><hr /><p><img alt="Radical Future Websites without Privacy Statements" src="http://www.educause.edu/sites/default/files/radical-students.jpg" style="width: 200px; height: 143px; border-width: 1px; border-style: solid; margin-left: 5px; margin-right: 5px;" /><img alt="Antiques Circa 2025 Privacy Please" src="http://www.educause.edu/sites/default/files/Antique.jpg" style="line-height: 1.4em; width: 200px; border-width: 1px; border-style: solid; height: 143px; margin-left: 5px; margin-right: 5px;" /></p><p><a href="http://www.educause.edu/blogs/vvogel/boyfriend-dilemma-are-you-giving-too-much-personal-information" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/spywear.jpg">spywear.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/Antique.jpg">Antique.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/Dumb-Dumber.jpg">Dumb-Dumber.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/radical-students.jpg">radical-students.jpg</a><div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/social.jpg">social.jpg</a></fieldset> Thu, 27 Feb 2014 23:50:41 +0000 307846 at http://www.educause.edu Trending Now: Recent News in the Postsecondary World of Next Generation Learning http://www.educause.edu/blogs/millichap/trending-now-recent-news-postsecondary-world-next-generation-learning-1 <p>In January&#8217;s &#160;<a href="http://nextgenlearning.org/blog/trending-now-postsecondary-8" target="_blank">&#8220;Trending Now: Postsecondary&#8221; post,</a> Kristen Vogt called attention to a Center for American Progress (CAP) report that pointed to competency-based credentials as a way to provide employers with more confidence in the capabilities of higher education graduates.</p><p><a href="http://www.educause.edu/blogs/millichap/trending-now-recent-news-postsecondary-world-next-generation-learning-1" target="_blank">read more</a></p> Thu, 27 Feb 2014 22:57:42 +0000 307836 at http://www.educause.edu Usability and Network Security in Higher Education http://www.educause.edu/blogs/vvogel/usability-and-network-security-higher-education <p>Guest Blogger: Rich Murphy, Director of Technical Account Management, <a href="https://twitter.com/BlackStratusInc">@BlackStratus</a></p><hr /><p><img alt="Rich Murphy BlackStratus" src="http://www.educause.edu/sites/default/files/RichMurphy.jpeg" style="width: 125px; height: 147px; float: right;" /></p><p>IT Systems administrators working in an academic setting are often faced with the unenviable task of balancing two seemingly disparate priorities: managing and mitigating security risks, and ensuring a user experience that is intuitive, seamless and reliable. This dilemma is not a new one &#8212; Frederick M. Avolio, writing at Networkcomputing.com, notes that &#8220;security and usability are often inversely proportional.&#8221;</p><p><a href="http://www.educause.edu/blogs/vvogel/usability-and-network-security-higher-education" target="_blank">read more</a></p><fieldset><legend>Uploads</legend>Attachments:<div class="filefield-icon field-icon-image-jpeg"><img class="field-icon-image-jpeg" alt="image/jpeg icon" src="http://www.educause.edu/sites/all/modules/contrib/filefield/icons/protocons/16x16/mimetypes/image-x-generic.png" /></div> <a href="http://www.educause.edu/sites/default/files/RichMurphy.jpeg">RichMurphy.jpeg</a></fieldset> Mon, 24 Feb 2014 20:23:47 +0000 307047 at http://www.educause.edu The Operations – Concierge Divide http://www.educause.edu/blogs/accidentalcio/operations-%E2%80%93-concierge-divide <p>Of all the things I get to do at the University of Georgia, one of my favorites is my lunchtime reading clubs, which are groups of mid-career IT professionals who get together regularly to discuss an interesting book. Typically, half of each club&#8217;s members come from EITS, the central IT organization on campus, and the other half comes from UGA&#8217;s schools, colleges, or other units. This semester, one of the clubs is reading Gene Kim&#8217;s (<a href="https://twitter.com/RealGeneKim" target="_blank">@RealGeneKim</a>) <i><a href="http://www.amazon.com/Phoenix-Project-DevOps-Helping-Business-ebook/dp/B00AZRBLHO/ref=sr_1_1?ie=UTF8&amp;qid=1393247144&amp;sr=8-1&amp;keywords=the+phoenix+project" target="_blank">The Phoenix Project</a></i>, and it is leading us through some very productive conversations on what service-oriented cultures really are &#8211; and more importantly, what they are not.<br /> </p><p><a href="http://www.educause.edu/blogs/accidentalcio/operations-%E2%80%93-concierge-divide" target="_blank">read more</a></p> Mon, 24 Feb 2014 13:23:29 +0000 307001 at http://www.educause.edu Interview: Matthew Burfeind, Massachusetts College of Art and Design http://www.educause.edu/blogs/gbayne/interview-matthew-burfeind-massachusetts-college-art-and-design <p><span style="color: rgb(51, 51, 51); font-family: Interstate, 'Lucida Grande', 'Lucida Sans Unicode', 'Lucida Sans', Garuda, Verdana, Tahoma, sans-serif; font-size: 16px; line-height: 22px;">Matthew Burfeind is interim CIO for the Massachusetts College of Art and Design. In this interview he talks about the challenges of collaboration, enterprise computing, and his role as interim CIO.</span></p><p><a href="http://www.educause.edu/blogs/gbayne/interview-matthew-burfeind-massachusetts-college-art-and-design" target="_blank">read more</a></p> 9:52 EDUCAUSE Review Online Matthew Burfeind is interim CIO for the Massachusetts College of Art and Design. In this interview he talks about the challenges of collaboration, enterprise computing, and his role as interim CIO. Matthew Burfeind is interim CIO for the Massachusetts College of Art and Design. In this interview he talks about the challenges of collaboration, enterprise computing, and his role as interim CIO. Fri, 21 Feb 2014 19:41:33 +0000 306971 at http://www.educause.edu A Discussion About the NSA and Government Surveillance http://www.educause.edu/blogs/mauraaupennedu/discussion-about-nsa-and-government-surveillance <p>To mark Data Privacy Month, the <a href="http://www.upenn.edu/oacp/privacy/">University of Pennsylvania</a> and the <a href="http://constitutioncenter.org/">National Constitution Center</a> hosted a Town Hall program with some of the nation&#39;s leading experts on privacy and surveillance. On February 3, 2014, Peter Swire of the White House NSA Review Board, Anita Allen of the University of Pennsylvania, and Charlie Savage of the New York Times joined Constitution Center&#39;s Jeffrey Rosen to discuss the NSA and government surveillance past and future. University of Pennsylvania faculty, staff, and students, as well as members of the public, were invited to participate in this free event.</p><p>If you could not attend the discussion in person, a <a href="http://www.youtube.com/watch?v=rg3tHFEA3H4">video recording</a> is now publicly available. Please fee free to share this resource on your campus in order to continue the privacy dialog with your colleagues.</p><p>&#160;</p><p><a href="http://www.educause.edu/blogs/mauraaupennedu/discussion-about-nsa-and-government-surveillance" target="_blank">read more</a></p> Thu, 20 Feb 2014 16:31:44 +0000 306839 at http://www.educause.edu NIST Releases Final Framework for Improving Critical Infrastructure Cybersecurity http://www.educause.edu/blogs/jen-ortega/nist-releases-final-framework-improving-critical-infrastructure-cybersecurity <p>The <a href="http://www.nist.gov/">National Institute of Standards and Technology</a> (NIST) released the initial version of its <a href="http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf">Framework for Improving Critical Infrastructure Cybersecurity</a> on Wednesday, February 12. The Framework provides owners of critical infrastructure and others with voluntary guidance on how to best protect information and assets from cyber attacks. The final Framework closely follows the <a href="http://www.nist.gov/itl/upload/preliminary-cybersecurity-framework.pdf">Preliminary Framework</a>&#160;NIST released in November 2013.</p><p><a href="http://www.educause.edu/blogs/jen-ortega/nist-releases-final-framework-improving-critical-infrastructure-cybersecurity" target="_blank">read more</a></p> Wed, 19 Feb 2014 14:50:43 +0000 306701 at http://www.educause.edu Social Justice and Privacy: An End to Solitude http://www.educause.edu/blogs/mcorn/social-justice-and-privacy-end-solitude <p>Within the privacy community it is commonly said that privacy is tightly coupled to societal notions of respect. We advocate for our local, national, and international institutions to protect personal information, to collect only the minimum needed, and to do so not merely to prevent financial loss or compliance with regulations, but because it demonstrates respect for individuals.</p><p>But what is the basis for this respect? We show respect for one another&#39;s feelings, we respect an individual&#39;s rights, and when we confront people in moments of great suffering or joy, we show respect for their privacy &#8212; we allow individuals the right to decide whether or not to share with us.</p><p><a href="http://www.educause.edu/blogs/mcorn/social-justice-and-privacy-end-solitude" target="_blank">read more</a></p> Mon, 10 Feb 2014 16:48:42 +0000 306123 at http://www.educause.edu Activate Instruction Helps Summit Public Schools Personalize Learning http://www.educause.edu/blogs/kvogt/activate-instruction-helps-summit-public-schools-personalize-learning <div class="field field-name-body field-type-text-with-summary field-label-hidden"> <div class="field-items"> <div class="field-item even"> <p>NGLC has embarked upon a new publication series, <em>Next Gen Tools</em>. Today, we share with you the first brief in the series, <a href="http://www.educause.edu/library/resources/next-gen-tools-activate-instruction" target="_blank"><em>Next Gen Tools: Activate Instruction</em></a>. Summit Public Schools teamed up with Illuminate Education and the Girard Education Foundation to create this free, open, and web-based platform for curricula that integrates performance assessment.</p></div></div></div><p><a href="http://www.educause.edu/blogs/kvogt/activate-instruction-helps-summit-public-schools-personalize-learning" target="_blank">read more</a></p> Thu, 06 Feb 2014 21:33:27 +0000 306015 at http://www.educause.edu Aim for the Rectangle Outside the Box http://www.educause.edu/blogs/nhays/aim-rectangle-outside-box <p>by <a href="http://www.educause.edu/members/david-underwood">David Underwood</a></p><p><strong>David Underwood is an academic technology consultant for the University of Colorado Boulder.</strong></p><p>My first job after leaving art school back in the eighties was with the art department at a local television station, where I shared an office with three other designers. We produced varied work, from airbrushed portraits of the on-air talent to &#34;personal checks&#34; the size of beach towels for the station&#39;s public donations to local charities.</p><p><a href="http://www.educause.edu/blogs/nhays/aim-rectangle-outside-box" target="_blank">read more</a></p> Tue, 04 Feb 2014 21:09:28 +0000 305901 at http://www.educause.edu Respecting Privacy, Safeguarding Data, Enabling Trust: How Do We Accomplish This on Personally Owned Computers? http://www.educause.edu/blogs/brymble/respecting-privacy-safeguarding-data-enabling-trust-how-do-we-accomplish-personally-owned-computers <p>A key challenge for any organization is balancing the protection of institutional data, respecting privacy and enabling trust, when employees access institutional systems with personally owned devices. Any BYOD strategy should address this balance. Personally owned devices usually are not under the control of the institution, and verifying that the devices are securely configured can feel intrusive. Allowing personal devices that are not checked for secure configuration and vulnerabilities to log into protected systems creates potentially serious and unknown risks. Institutional attempts to influence or cause configuration changes on personally owned assets and scanning them for vulnerabilities raises questions about trust and liability.</p><p><a href="http://www.educause.edu/blogs/brymble/respecting-privacy-safeguarding-data-enabling-trust-how-do-we-accomplish-personally-owned-computers" target="_blank">read more</a></p> Mon, 03 Feb 2014 16:21:59 +0000 305764 at http://www.educause.edu