By Audience: Postsecondary School Officials

The resources on this page are intended for staff and educators of Postsecondary Institutions.  Resources found here typically address FERPA’s requirements and how they apply to the various day-to-day operations of postsecondary institutions that may be different than the K-12 setting.  Guidance is also provided for the particular challenges encountered at the postsecondary level as it relates to the handling and protection of students’ Personally Identifiable Information.

Best Practices

Malicious Software Data Breach Facilitator Guide

This Malicious Software Data Breach Scenario is an interactive exercise designed to provide participants with the opportunity to experience firsthand the process and pitfalls of responding to a data breach at the organizational level. Over the course of one to two hours, participants explore the scenario of a malicious ransomware incident affecting student information as well as other personally identifiable information (PII) from their organization.

The package includes three parts: Facilitator’s Guide, Presentation, and Exercise Handouts. Please find the additional parts below.

Best Practices

Malicious Software Data Breach Presentation

This Malicious Software Data Breach Scenario is an interactive exercise designed to provide participants with the opportunity to experience firsthand the process and pitfalls of responding to a data breach at the organizational level. Over the course of one to two hours, participants explore the scenario of a malicious ransomware incident affecting student information as well as other personally identifiable information (PII) from their organization.

The package includes three parts: Facilitator’s Guide, Presentation, and Exercise Handouts. Please find the additional parts below.

Best Practices

Malicious Software Data Breach Handouts

This Malicious Software Data Breach Scenario is an interactive exercise designed to provide participants with the opportunity to experience firsthand the process and pitfalls of responding to a data breach at the organizational level. Over the course of one to two hours, participants explore the scenario of a malicious ransomware incident affecting student information as well as other personally identifiable information (PII) from their organization.

The package includes three parts: Facilitator’s Guide, Presentation, and Exercise Handouts. Please find the additional parts below.