{"id":71803,"date":"2013-01-25T08:27:17","date_gmt":"2013-01-25T13:27:17","guid":{"rendered":"https:\/\/today.uconn.edu\/?p=71803"},"modified":"2023-06-27T13:13:28","modified_gmt":"2023-06-27T17:13:28","slug":"uconn-offers-range-of-resources-to-promote-data-privacy-and-security","status":"publish","type":"post","link":"https:\/\/today.uconn.edu\/2013\/01\/uconn-offers-range-of-resources-to-promote-data-privacy-and-security\/","title":{"rendered":"UConn Offers Range of Resources to Promote Data Privacy and Security"},"content":{"rendered":"<p>Whether it\u2019s on desktop computers, cell phones, or tablet devices, University of Connecticut students and employees consume and share countless bits of electronic data every day.<\/p>\n<p><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD.jpg\"><img decoding=\"async\" class=\"size-thumbnail wp-image-71587 alignright img-responsive lazyload\" alt=\"Data Privacy Day badge\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-150x150.jpg\" width=\"150\" height=\"150\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-150x150.jpg 150w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-300x300.jpg 300w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-420x420.jpg 420w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-100x100.jpg 100w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-50x50.jpg 50w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-32x32.jpg 32w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-64x64.jpg 64w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-96x96.jpg 96w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-128x128.jpg 128w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD-120x120.jpg 120w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2013\/01\/DPD.jpg 500w\" data-sizes=\"(max-width: 150px) 100vw, 150px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 150px; --smush-placeholder-aspect-ratio: 150\/150;\" \/><\/a><\/p>\n<p>UConn\u2019s commitment to protect the security and privacy of that data \u2013 and to arm users with the knowledge to do the same \u2013 is at the core of several initiatives currently taking place.<\/p>\n<p>Although they are under way throughout the year, the initiatives are being highlighted as UConn participates in international Data Privacy Month, which culminates in Data Privacy Day on Monday, Jan. 28. The University has also been named a <a href=\"http:\/\/www.staysafeonline.org\/data-privacy-day\/champions\/\">Data Privacy Champion<\/a> by the National Cyber Security Alliance for its efforts.<\/p>\n<p><strong>Data privacy website<\/strong><\/p>\n<p>One major initiative has been the launch of a special data privacy website at UConn at <a href=\"http:\/\/privacy.uconn.edu\">http:\/\/privacy.uconn.edu<\/a>. It includes a regularly updated blog, details on UConn\u2019s <a href=\"http:\/\/secureu.uconn.edu\/\">secureU<\/a> initiative, and tips on everything from helpful apps to protecting against identity theft.<\/p>\n<p>UConn\u2019s <a href=\"http:\/\/www.audit.uconn.edu\/\">Compliance Office<\/a> and <a href=\"http:\/\/security.uconn.edu\">Information Security Office<\/a> are teaming up to provide the University community with information to help protect themselves, their families, colleagues, and the University from privacy breaches, and make well-reasoned choices about what they share online, in email, and on smartphones.<\/p>\n<blockquote><p>At UConn, we take privacy and data security very seriously.<\/p><\/blockquote>\n<p>\u201cHere at UConn, we take privacy and data security very seriously. Many systems are in place, and resources are available to protect sensitive information we collect and maintain as part of our business practices,\u201d says Rachel Krinsky Rudnick, author of UConn\u2019s data privacy blog and assistant director of compliance\/privacy in the Office of Audit, Compliance &amp; Ethics.<\/p>\n<p>The efforts during Data Privacy Month have focused on different topics to provide readers with pointers and other resources. In addition to the privacy.uconn.edu site, information is also available on Facebook at <a href=\"http:\/\/facebook.com\/UConnHuskyHunt\">@UConnHuskyHunt<\/a> or <a href=\"http:\/\/facebook.com\/UConniso\">@UConniso<\/a>, and on Twitter at <a href=\"http:\/\/twitter.com\/UConnISO\">@UConnISO<\/a>.<\/p>\n<p><b>Planning for an emergency<\/b><\/p>\n<p>Some of UConn\u2019s other data privacy and security initiatives include updating plans on how to protect and recover data during natural disasters and other disruptive events.<\/p>\n<p>\u201cAs we reflect on the impact of a natural disaster in other states on their institutions of higher education, we recognize the importance of a strong effort at UConn,\u201d says Nancy Bull, UConn\u2019s vice provost for information technology. \u201cThe impact of Hurricane Katrina on institutions of higher learning in New Orleans was an eye-opener for all of us.\u201d<\/p>\n<p>Some of those schools faced difficulty getting to some data because their servers or hardware were damaged or inaccessible, and because they either lacked backup sites or those sites were nearly as inaccessible during the emergency as the primary spots.<\/p>\n<p>Victor Font Jr., business continuity and disaster recovery coordinator for University Information Technology Services (<a href=\"http:\/\/uits.uconn.edu\/\">UITS<\/a>), is heading up the UConn effort. He\u2019s also chairing a steering committee to determine appropriate backup data plans, and to update UConn\u2019s data recovery plans through a series of tests and exercises.<\/p>\n<p>\u201cIt is during these exercises that we can pinpoint the weaknesses and omissions in a disaster plan. You do not want to find them during an actual disaster,\u201d Font says.<\/p>\n<p><b>Statewide collaboration<\/b><\/p>\n<p>UConn\u2019s data security and privacy efforts do not end at its own borders. Starting in the fall semester, UConn teamed up with Quinnipiac University to launch a group of information technology officials from colleges and universities throughout Connecticut that will share challenges, experiences, and solutions.<\/p>\n<p>The Connecticut Higher Education Roundtable on Information Security (CHERIS) kicked off in the fall semester, and about two dozen Connecticut colleges, universities, and related entities are participating \u2013 the vast majority of Connecticut\u2019s higher education community.<\/p>\n<figure id=\"attachment_25585\" aria-describedby=\"caption-attachment-25585\" style=\"width: 200px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_t.jpg\"><img decoding=\"async\" class=\"size-full wp-image-25585 img-responsive lazyload\" title=\"Jason Pufahl\" alt=\"Jason Pufahl, chief information systems security officer.\" data-src=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_t.jpg\" width=\"200\" height=\"200\" data-srcset=\"https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_t.jpg 270w, https:\/\/today.uconn.edu\/wp-content\/uploads\/2010\/11\/Pufahl7633_t-150x150.jpg 150w\" data-sizes=\"(max-width: 200px) 100vw, 200px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 200px; --smush-placeholder-aspect-ratio: 200\/200;\" \/><\/a><figcaption id=\"caption-attachment-25585\" class=\"wp-caption-text\">Jason Pufahl, UConn&#8217;s chief information systems security officer.<\/figcaption><\/figure>\n<p>\u201cCHERIS was created to establish a forum for Connecticut Higher Education to collaborate in solving the information security challenges we collectively face,\u201d says Jason Pufahl, UConn\u2019s chief information systems security officer.<\/p>\n<p>Information security in higher education has become critically important, as colleges and universities use their computers and networks for everything from confidential financial data to electronic correspondence, scheduling, and personnel management.<\/p>\n<p>CHERIS organizers say the roundtable discussions benefit the colleges and universities \u2013 and, by extension, the campus communities and the state \u2013 by providing a forum in which information security professionals can share best practices for ensuring the protection of those complex systems.<\/p>\n<p>UConn\u2019s Information Security Office also recently held a \u201cHusky Hunt,\u201d an online scavenger hunt to increase students\u2019 awareness of computer security basics and help them detect potential hazards.<\/p>\n<p>Students logged on to the HuskyHunt website weekly with unique IDs, then performed a simple task related to computer security so they could receive a clue for the scavenger hunt. They also posted their answers on social media, spreading the word more widely as they won points toward awards ranging from t-shirts to free textbooks. Another HuskyHunt is planned to take place in fall 2013.<\/p>\n<p>UConn also uses its secureU webpage (secureu.uconn.edu) to provide information and resources to faculty and staff, including links to the important Information Security Policy Manual and a variety of security tips, training opportunities, and contacts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From everyday business practices to planning for an emergency, UConn is helping members of the university community protect the security of electronic data.<\/p>\n","protected":false},"author":65,"featured_media":71840,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","wds_primary_category":0,"wds_primary_series":0,"wds_primary_attribution":0,"footnotes":""},"categories":[1,2234],"tags":[],"magazine-issues":[],"coauthors":[124],"class_list":["post-71803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","category-university-life"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"publishpress_future_action":{"enabled":false,"date":"2026-05-07 06:30:12","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/71803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/comments?post=71803"}],"version-history":[{"count":5,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/71803\/revisions"}],"predecessor-version":[{"id":72030,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/posts\/71803\/revisions\/72030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media\/71840"}],"wp:attachment":[{"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/media?parent=71803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/categories?post=71803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/tags?post=71803"},{"taxonomy":"magazine-issue","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/magazine-issues?post=71803"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/today.uconn.edu\/wp-rest\/wp\/v2\/coauthors?post=71803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}