This paper defines data protection as “the principles and processes for protecting data from corruption, misapplication, compromise, misuse, and loss.” Data protection leverages evolving technology and emerging practices to focus on how to apply the three critical information security imperatives: confidentiality, integrity, and availability.
BiographyGeoff Nathan is a faculty member in the Linguistics Program at Wayne State University, but also serves as Faculty Liaison to Wayne States Computing and Information Technology Division. In that role he serves on the Leadership Team, advising on policy issues and representing the academic users. In addition he is coordinating a Security assessment of Waynes information technology systems and also serves as chair of the Teaching, Learning and Technology Roundtable. He came to Wayne in 2002 from Southern Illinois University at Carbondale, where he served as chair of the Computing Advisory Committee for several years, and helped develop SIUCs Strategic Plan for Computing. He holds a PhD in Linguistics from the University of Hawai`i and his area of research is phonetics and phonology.
Privacy officers have several areas of responsibility. This blog shares a day in the life of the Wayne State University information privacy officer.
This article discusses IT and policy questions to consider in implementing processes within IT systems to support a student’s gender identity, such as preferred name, gender specification, and pronoun.