|
Posted By Sara Gigeroff, University of New Brunswick,
Monday, July 10, 2023
Updated: Sunday, July 9, 2023
|
A Compilation of Contributions
ACUPA’s Blog Committee would like to take this opportunity to reintroduce members to our blog, Policy Matters
! Policy Matters launched in 2018 taking the place of ACUPAexchange
, a triannual newsletter publication. The original purpose of the blog was to address the needs of our members and maximize the efficiency of our processes. To highlight the efforts of current and past Blog Committee members, as well as volunteer
contributors, all posts published since the inception of the blog have been organized alphabetically into categories based on theme and are linked below for easy access.
ACUPA (General)
ACUPA Blog Committee Welcomes Policy Experts
ACUPA Website Features
Welcome to the New Blog!
Accessibility
Are Your Policies Accessible? Part 1: An Introduction to Web Accessibility
Are Your Policies Accessible? Part 2: Common Mistakes and How to Avoid Them
Are Your Policies Accessible? Part 3: Automating Accessibility in Custom Word Templates
Are Your Policies Fully Available to Your Stakeholders?
Hybrid/Remote Work
Adapt to an Online Environment to Develop Policies
And Now We Zoom...
Hybrid Work Schedules
Pivot to a Remote Work Environment
Pandemic and Policy
A Sea of Change and a Pandemic
Campus Changes in Light of the Coronavirus
Moving toward a New Normal
Policy Changes on Steroids and I'm Over It
Policy Matters Open Forum Covid
To Vax, or not to Vax
Policy in the News
Policy in the News (2023)
Policy in the News (2022)
Policy in the News (2021)
Policy in the News (2020)
Policy in the News (2019)
The Policy Process
Always Getting Better
Benchmarking Policies
Choose Your Words Carefully
Do I Really Need a Policy and Procedure?
Do You Cite References in Policy?
Do you evaluate your policy objectives?
Expediting Policies to Address Organizational Risks
Inclusive Policy Development
Increase Awareness of and Participation in Policy Development
Let's Talk About Procedures!
Organizing a Policy Catalog
Our Language Matters
Policies as More than Rules
Policy Development – Are Templates Required?
Policies Requiring Public Review and Comment
Project Management
The First Element
What Is a Policy?
When Your Steering Committee Fails to Steer
Where Does Your Policy Function Belong?
Where have all the Policies Gone? Part I
Where have all the Policies Gone? Part II
Roles and Responsibilities of Policy Professionals
Beyond the Policy Administrators Role
Defining Career Success
Other Duties as Assigned
So, What Do You Do?
What it Takes to be an Effective Policy Administrator
What’s In Your Policy Closet?
Software, Programs, and Digitization
Behind the Scenes of Policy Data
Customize Your Microsoft Word Experience (I)
Customize Your Microsoft Word Experience (II)
Easily Convert Web Pages to PDF Format
In Search of Innovation
Policy Administration for the Digital Age
Version Control, Auto Saving, and Collaborative Editing
Title IX
Historical View of Title IX
Title IX Officers are the People Who Stay Awake at Night
Miscellaneous
Bereavement Leave
Betting on College Sports
Equity Review at Georgia Gwinnett College
Is Technology Dictating Policy?
Is Your Institution Ready for the Robot Invasion?
Learning and Love
"Operation Varsity Blues": High Stakes Testing in College Admissions
Policy and Political Activism
Protecting Essential Records -- Key to Surviving a Catastrophe
Reducing Risks to Institutional Data
Student Interns as Valued Employees
The Joining of Two Community Colleges
The Power of P3s
The Robots are Coming
The Violence of the Last Six Months
Thoughts on Retirement
Values in Action
As was stated in the inaugural blog post, we continue to appeal to you, our members, to help us evolve and decide whether the information shared in the featured posts are relevant and interesting. Do you have an idea for a blog post? Ultimately, this blog is for you, our members, and your submissions are encouraged and welcomed! If you are interested in contributing as a guest (maybe you are interested in being interviewed to share your own experiences as a policy professional), becoming a member of the Blog Committee, or want to share an idea for a topic to be explored through a post, please do not hesitate to contact us.
Tags:
accessibility
ACUPA
Data
developing policies
diversity
equity
guidelines
Hybrid
Microsoft
News
Pandemic
PDF
policies
policies and procedures
policy
policy design
policy development
policy/procedures
Programs
Remote
resources
Responsibilities
Roles
Sara Gigeroff
Software
Word
Permalink
| Comments (0)
|
|
Posted By Deborah Bartlett, Washington State University,
Monday, July 19, 2021
|
How Safe Is Your Data? And Who Do You Tell If It's Not? Data security and data privacy issues aren't new to higher education. But the pandemic years ramped up remote access to all institutional systems and increased administrative awareness of the compliance risks which accompany our increased electronic operations. Not only are administrators increasingly concerned with addressing these risks, but state and federal legislation has increased the requirements for the management and protection of institutional data, as well as notification to members of the public (including students and other clients) regarding data breaches. My institution, Washington State University, beefed up its policies and procedures on system data and information security in 2020. Along with revising two executive policies (EP8 on data policies and EP37 on information security), our administrative policy office published a new chapter on information security in our Business Policies and Procedures Manual (BPPM) with seven new information security sections. (See BPPM Chapter 87.) And at the end of 2020, we published an executive policy on the requirements and responsibilities related to the university's designation as a HIPAA hybrid entity. (See EP40). Our administration recently provided the rough drafts of two new BPPM policies to my administrative policy office for draft preparation and approval routing. One is a policy with related procedures regarding responses to information security incidents and breaches. The other concerns responses to breaches of protected health care information (PHI), which is planned for insertion into a new BPPM chapter on information privacy. The two policies will be linked through a new investigation process which is extensively outlined step-by-step and is to be used for both types of information privacy/security breaches. We hope to have these new policy/procedures sections approved and published by the fall, so you're welcome to revisit our BPPM for reference. In conjunction with these new policies and procedures, our administration is updating the WSU system data and information security policies and procedures to address issues such as protection of WSU systems, services, devices, and data, including systems and data managed for the university by third parties and external cloud systems. I'm sure that we're not the only institutions who are working on these types of policies. Are you and your administration working on data security and data privacy policies? Have you addressed how your institution will respond to data breaches? In trying to understand the reasoning behind our administration's request for these policy changes, I did some looking around to see what recently published news and resources might be available. Here's what I found – I hope this information is useful to you.
Tags:
breach investigation
breach notification
breach response
breaches
cloud
data
data security
Deborah Bartlett
HIPAA
information privacy
information security
institutional data
IT
personal health information
PHI
portal
privacy
research data
security
system data
Permalink
| Comments (1)
|
|
Posted By Jessica Teets CCEP, Purdue University,
Monday, June 21, 2021
Updated: Monday, September 27, 2021
|
Can a policy management system track as well as I can? The views expressed in this post are solely those of the author and do not represent the views of ACUPA or Purdue University. I track a fair amount of data with each of the policies in the Purdue University policy library. Currently, I use Excel to manually track all my data. Even to me, this seems a bit archaic with the variety of policy management systems out there. I have looked at a couple vendors, but have stopped short of pursuing a contract because I am afraid I won’t be able to capture all my data. Some data are pretty standard, such as the date of issue, the responsible executive, the responsible office, and the volume and chapter (see my post from October 2020 on Organizing a Policy Catalog to learn more about the last two). It’s easy to designate a field that captures these data. It is also easy to track the date a policy was last revised. Even systems that are not designed exclusively for policy management can track version dates. Where I run into trouble is finding a way to automatically track the last date a policy was reviewed. Policies get revised all the time. Titles, phone numbers, and email addresses change frequently, which require an update to the affected policy, and thus, a new version date. Most of the time, however, these small administrative updates do not coincide with a comprehensive review of the policy. If I were to use the version date to determine when a policy is due for review, I would likely have a lot of policies that never get reviewed because the version date never falls outside the review period (which, at Purdue, is every five years). I also get tripped up when a policy supersedes another policy. This can happen for a number of reasons, such as the title of the policy changing, two policies being combined into one or vice versa, old memos being updated into policies, etc. With my Excel spreadsheet, I am able to track a current policy all the way back to its origin, even if that is a memo from 1952. I can tell you the name and number of the policy or memo that addressed a given subject on a given date, and I can find a copy of that document in our e-archives. I have not had to track anything back to 1952, but I have had instances when our legal counsel needed all the versions of a policy going back several years. I just don’t see how a system could track this kind of serpentine information. Last, but not least, we allow for interim policies. This means a policy can go into effect without having gone through all the required steps. The policy owner then has six months to finish all the steps and finalize the policy, or request an extension of the interim status. I mark policies as interim and track the six-month deadline in Excel. It seems to me that I would have to continue to track this sort of thing manually even if I had a policy management system. Maybe I am making things too complicated. Maybe I need to let something go. What do you think?
Tags:
data
Jessica Teets
policy management
policy process
policy tracking
Permalink
| Comments (2)
|
|
Posted By Deborah Bartlett, Washington State University,
Monday, May 10, 2021
|
Articles on topics that may affect your organization’s policies As we move into the summer semester, the Blog Committee would like to share some of the articles we’ve been reading that relate to policy administration in higher education. - Title IX Public Hearing Scheduled for June
By Alexis Gravely, Inside Higher Ed, May 7, 2021 - What Colleges Require the COVID-19 Vaccine?
By Staff Writers, Best Colleges, May 6, 2021 - Johns Hopkins Increasing Minimum Wage to $15
By Mychael Schnell, The Hill, May 6, 2021 - Students Are on the Move. Their Financial Aid Is Not
By Juana Sanchez and Lara Couturier, Inside Higher Ed, May 6, 2021 - COVID-19: Updates for Canada’s Universities
By UA/AU, University Affairs, May 5, 2021 - At Some Colleges, Remote Work Could Be Here to Stay
By Lindsay Ellis, The Chronicle of Higher Education, May 5, 2021 - Hundreds Protest over Yale Contract Talks
By Mary E. O'Leary, New Haven Register, May 1, 2021 - COVID-19 Has Altered Student Expectations for Data Privacy
By Adam Stone, EdTech Focus on Higher Education, April 28, 2021 - Keeping an Eye on Biden Administration's Higher Education Policies
By Anna Mazarakis, Princeton Alumni Weekly, May 2021 Issue - Protecting and Ensuring Student Privacy
By Mary Ellen Buzzelli, Inside Higher Ed, April 16, 2021 - Mandatory COVID Vaccines for Students: Legal Pain Point or Panacea?
By Michael Vernick, Brennan Meier, Molly Whitman, and Jessica Mannon, University Business, April 16, 2021
Tags:
Canada
COVID-19
cybersecurity
data
employment contract
financial aid
free speech
gap
gender
hot topics
HR
information
IT
legal
minimum wage
news
pandemic
phishing
policy
policy in the news
poverty
privacy
records
remote work
sexual harassment
students
Title IX
vaccines
Permalink
| Comments (0)
|
|
Posted By Brittani Brown, California State University San Marcos,
Friday, March 5, 2021
|
What It Means to Have an Effective Policy ProgramHave you ever written a policy that took hours of research, conversations, and meetings and years to get approved? Then, months or even years are dedicated to implementation and operationalizing the policy. Program evaluation can take place at various stages of the policy process to assess progress, milestones, and data amongst other things. Then what? When do you evaluate your policy and related programs and how? The most common stage for program evaluation to take place is the evaluation and termination stage, when policies are evaluated against how successful they were at meeting their objectives (Fischer, Miller, & Sidney, 2007). Program evaluations focus on the inputs (resources) and outputs because program implementations are meant to be successful and require resources, which are increasingly scarce. Focusing on the level of resources used against the outcomes is important to funders. In other words, what did we get for our money? Over the years, evidence-based reporting has increased in popularity amongst public and nonprofit sectors (Emerson, 2009). Organizations need to show apparent, demonstrated and proven effectiveness. Apparent effectiveness is the short-term result, indicating, through documentation, the program is being utilized (Emerson, 2009). Demonstrated effectiveness refers to measuring the impact of the program (Emerson, 2009). Lastly, proven effectiveness, a scientifically proven measurement of a program’s success (Emerson, 2009). Both demonstrated and proven effectiveness utilize a third party evaluator to gauge the effectiveness (Emerson, 2009). After our last policy implementation, we regrouped with our customers and discussed areas for continued refinement, improvement, and revisions. Even though we sought input and held focus groups prior to implementation, we still had opportunity to improve. As you prepare your next policy implementation, think ahead to how you evaluate your program. Can you deliver evidence-based reporting? Can you demonstrate the public policy need was met? To find out, engage with your stakeholders and customers before, during, and after to seek feedback. If data is available to help evaluate, utilize that as well. References- Emerson, J. (2009). But does it work? How to best assess program performance. Stanford Social Innovation Review, 29-30.
- Fischer, F., Miller, G. J., & Sidney, M. S. (2007). Handbook on public policy analysis. Boca Raton: CRC Press.
Tags:
analysis
assessment
Brittani Brown
data
effectiveness
evaluation
evidence-based
implementation
milestones
objectives
outcomes
policy
program
progress
Permalink
| Comments (2)
|
|
Posted By Megan Jones, Metropolitan State University of Denver,
Tuesday, September 29, 2020
|
Articles on topics that may affect your organization’s policiesAs we continue the fall semester, the Blog Committee would like to share some of the articles we’ve been reading that relate to policy administration in higher education. - Class Notes: The gender poverty gap, COVID-19’s impact on college students, and more
By Ember Smith and Richard V. Reeves, The Brookings Institution, Sept. 9, 2020 - A Perception Problem About Free Speech
By Greta Anderson, Inside Higher Ed, Sept. 29, 2020 - University of California must stop all use of SAT and ACT in admissions, judge orders
By Michael Burke, Ed Source, Sept. 1, 2020 - Accommodations in the Time of COVID
By Nancy Gunzenhauser Popper, Talent Management and HR, Aug. 31, 2020 - UW System: Registration is now open for national public summit on preventing sexual harassment in higher education
WisBusiness.com, Sept. 29, 2020 - 4 COVID-era Cybersecurity Threats CISOs are Confronting
By Matt Zalaznick, University Business, Aug. 20, 2020 - California Bill Likely Conflicts with New Title IX Regulation
By Jeremy Bauer-Wolf, Education Dive, Aug. 28, 2020
Tags:
accommodation
ACTs
ADA
admissions
COVID-19
cybersecurity
data
free speech
gap
gender
hot topics
HR
information
IT
legal
news
pandemic
phishing
policy
policy in the news
poverty
remote work
research
SATs
security
sexual harassment
students
talent management
Permalink
| Comments (0)
|
|