A rise in identity theft is presenting employers with a major headache. They are being held liable for identity theft that occurs in the workplace.
University Business surveyed 160 chief information officers and IT directors from colleges and universities nationwide to find out how and where their IT dollars were being spent. (For UB's companion feature story see "Smart IT Spending Strategies," December 2005.)
Viruses and worms have attacked every college and university network. Predictably, almost all colleges and universities use some virus protection software, spam filtering and or firewalls to try to protect IT networks. Still, the attacks keep coming, as do the security breaches.
Student blogs that are sponsored by Admissions offices have quickly spread all over the country. If you haven't started a blog like this yet, you are probably looking at what other institutions are doing with great interest, envy, or fear-and definitely with some pressing questions.
Picture these scenarios:
At 1 a.m., a student heading back to her dorm after a late-night study group skips the shuttle, opting for a cross-campus walk, sans company, instead.