This paper defines data protection as “the principles and processes for protecting data from corruption, misapplication, compromise, misuse, and loss.” Data protection leverages evolving technology and emerging practices to focus on how to apply the three critical information security imperatives: confidentiality, integrity, and availability.
Theresa serves as Chief Information Security Officer for the Nevada System of Higher Education. She was responsible for the oversight and coordination processes for building a system-wide information security strategy and program that encompasses policies, standards, and procedures. Theresa has an undergraduate degree in computer information systems, masters degrees in business administration and management, and is a Certified Information Systems Auditor (CISA).
This article discusses IT and policy questions to consider in implementing processes within IT systems to support a student’s gender identity, such as preferred name, gender specification, and pronoun.
This report provides insight into the evolving CISO position—an understanding of which is critical to ensuring the strategic success of information security leaders in higher education.