Information and data are the currency of the 21st century. It's valuable — and IU retains a great deal of it. Many of us are responsible for the safety of other people's information. Every appropriate safeguard must be taken to secure this data.

Site Pages

Common questions received by the ERM staff
Tools utilized by the ERM Program at IU
Privacy Training & Awareness
Generating a successful online survey can be more difficult than people realize. Read some best practices centered around user engagement, meaningful results, and of course, the protection of potentially private information.
ERM at Indiana University
TCP Wrappers
Desktop indexing and searching programs do a very thorough job β€” indexing everything without regard for sensitivity of the data being indexed. Be aware of sensitive data you may have on your computer and considering excluding it from the search index.
Data Privacy Day at IU highlighted FERPA, the Family Educational Rights and Privacy Act β€” led by Dennis Hicks and Mary Beth Myers, Registrars for IU East and IUPUI, respectively.
Various comics and political cartoons related to privacy.
Samples, checklists, and templates for documenting IT compliance, provided by UITS IT Professional Services & Support.
  • Download a PDF of the

Recent Security Bulletins

  • A critical vulnerability in Microsoft's HTTP.sys component may lead to remote code execution.
  • Adobe Flash is vulnerable to exploit that could allow an attacker to take control of the affected system.
  • Vulnerability in SSL 3.0
  • Critical Bash Exploit: Shellshock