Information and data are the currency of the 21st century. It's valuable — and IU retains a great deal of it. Many of us are responsible for the safety of other people's information. Every appropriate safeguard must be taken to secure this data.

Site Pages

Common questions received by the ERM staff
Tools utilized by the ERM Program at IU
Privacy Training & Awareness
Generating a successful online survey can be more difficult than people realize. Read some best practices centered around user engagement, meaningful results, and of course, the protection of potentially private information.
ERM at Indiana University
TCP Wrappers
Desktop indexing and searching programs do a very thorough job — indexing everything without regard for sensitivity of the data being indexed. Be aware of sensitive data you may have on your computer and considering excluding it from the search index.
Data Privacy Day at IU highlighted FERPA, the Family Educational Rights and Privacy Act — led by Dennis Hicks and Mary Beth Myers, Registrars for IU East and IUPUI, respectively.
Various comics and political cartoons related to privacy.
Samples, checklists, and templates for documenting IT compliance, provided by UITS IT Professional Services & Support.
  • Download a PDF of the

Recent Security Bulletins

  • Vulnerability in OpenSSL versions 1.0.1 before 1.0.1g
  • New ransomware named CryptoLocker threatens to destroy data unless a payment is made.
  • Critical Java Vulnerability included in Exploit Kit
  • This bulletin details four recently published, critical rated, vulnerabillies in Adobe ColdFusion and ways to mitigate the risk of them being exploited including the hotfix for supported versions.
    • Read the PSIA Blog