Data Security and Higher Education

Historically, educational institutions have been responsible for a large portion of all data breaches, creating astronomical losses. Taking steps to prevent these losses is essential. The complexity of academic culture and the importance of the exchange of information and ideas means institutions of higher education are faced with a more complicated situation than corporations when it comes to data security.

While enterprise data security systems are designed to protect the needs of businesses, colleges and universities must uphold the value of the free exchange of ideas while keeping students’ private information secure and complying with many state and federals laws, including the Family Educational Rights Privacy Act (FERPA), the Health Information Portability and Accessibility Act (HIPAA), the Gramm Leach Bliley Act (GLBA), the Fair Credit Reporting Act, the Sarbanes-Oxley (SOX), the Federal Privacy Act and others.

Risk Factors

Several common characteristics of university information systems put your institution at risk of data breach:

  • To maximize usability, university network systems are often configured to allow multiple points of access.
  • Outsourced IT entities and other service providers (e.g., e-mail systems, financial aid disbursement or ID card management) may have direct access to the network, increasing potential exposures.
  • Decentralized departments disconnected with central IT operate independently and abide by loosely defined privacy and security practices, increasing the risk of the parent organization.
  • Ubiquitous use of social networks by students leads some institutions to monitor behavior, which could create a duty of care to protect students from dangerous or criminal behavior.
  • Limited resources to secure networks, which leads to widespread use of open source security software that could be less effective than a customized solution.
  • Research universities often have highly confidential or sensitive information stored on their systems, which could be a lucrative target for cyber attacks.
  • Universities that host clinical trials or any human subject research must also comply with Health Information Portability and Accessibility Act (HIPAA) privacy and security rules.

Designing Reasonable Security

IT departments can take several steps to maximize the security of university information systems. Unfortunately, increased security generally means inconvenience and less utility given the need to freely exchange information within the academic community. To maintain this balance educational institutions should proactively take the following actions:

  • Establish a baseline for security and benchmark progress against it.
  • Be cognizant of how different departments are sharing information.
  • Verify network behavior of students, researchers, visiting professors and other administration professionals via permissions, access control, defined roles and real-time monitoring
  • Identify existing system vulnerabilities and prioritize eliminating these vulnerabilities.
  • Monitor and maintain systems continuously.
  • Automate security processes, and schedule routine tasks and reports to stay informed on performance.
  • Ensure that patches are implemented in a timely manner.
  • Conduct regular audits to ensure that policies are on track and identify irregularities or potential breaches.
  • Support auditing activities with real-time intrusion detection to critical systems.

In the Event of a Breach

While federal legislation under FERPA, FACTA and HIPAA does not contain provisions mandating consumer notification in the event of a data breach, many institutions of higher education may be subject to state breach notification statutes, most of which require swift public disclosure of any potential breach of personally identifiable information. Consult with an attorney to identify which statutes may apply to your institution.

Potential lawsuits claiming negligence must demonstrate that accepted standards of performance were not met, and that the plaintiff suffered some sort of direct harm as a result of the negligence.

Contractual Allocation of Risk

Since a large portion of reported breaches are attributed to external partners, consultants, outsourcers and contractors, it is critical to determine the boundaries of liability when sharing confidential information for business purposes. Even commonplace outsourcing arrangements can lead to complicated chains of liability dealing with subcontractors. Take the following steps to mitigate risk:

  • Clearly define responsibility
  • Ensure proper precautions are taken when information is out of the control of the educational institution
  • Limit the contractual liability of the organization in the event of a data breach
  • Work closely with legal counsel and INSURICA to ensure that insurance requirements, contractual indemnities and your institution’s insurance policies work harmoniously

Your Insurance Policy

It is important to review your general liability and property policies to determine the extent of coverage for data breaches. Exclusions are common as general liability carriers offer standalone network security and privacy policies. INSURICA can help you determine what, if any, additional coverage is needed to effectively protect your institution from data breach liability exposures.

This article is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. © 2011 Zywave, Inc. All rights reserved.

About the Author

INSURICA
INSURICA

Share This Story

Stay Updated

Subscribe to the INSURICA blog and receive the latest news direct to your inbox.

Related Blogs

OSHA Announces Top 10 Violations for 2025

October 8th, 2025|Blog, Risk Management, Trending|

OSHA recently revealed its top 10 most frequently cited standards in the 2025 fiscal year using preliminary data. This information is valuable for businesses of all kinds, as it helps them identify common exposures that affect their workforce and gives them the information they need to plan their compliance programs.

Cyber Hygiene for Schools: Teaching Digital Safety to Students

October 7th, 2025|Blog, Education|

Cyber hygiene for schools is more important than ever in today’s digital learning environment. Teaching digital safety to students not only protects their personal information but also strengthens overall school cybersecurity. With increasing online access in classrooms, cyber hygiene for schools must become a routine part of curriculum planning and student behavior expectations.

Mental Health Benefits Go Mainstream: What Employers Need to Know

October 6th, 2025|Blog, Employee Benefits|

Once considered a niche offering or a reactive add-on, mental health benefits have now moved to the center of the employee experience. In 2025, nearly half of U.S. employers offer some form of mental health support beyond traditional EAPs—a sharp rise from just 30% in 2023. This shift isn’t just cultural; it’s strategic.

Go to Top