Take Four: Maintaining Privacy and Protecting Data at Colleges and Universities
Facebook Facebook Twitter Twitter LinkedIn LinkedIn Email Email 0 Comments Comments
4. Take advantage of existing IT projects. Earmark part of the institution’s IT budget for operational projects such as enterprise resource planning programs for identity-based controls and make protection against identity theft a fundamental part of the IT environment.
Trusted Network Technologies is an Atlanta-based provider of identity-based management solutions and Knowledgestorm is an Alpharetta, Ga.-based online resource for technology solutions and information. To view this white paper, visit http://tinyurl.com/qphgr
« Previous 1 2 All