Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS
Information governance for campus card programs

How campus card programs can strengthen data protection through information governance

Webinar explores the dangers and offers practical approaches to minimize risk

CampusIDNews Staff   ||   Mar 20, 2026  ||   ,

We all know campus card programs generate a constant stream of data, and each interaction creates a digital record. Protecting this data and the individuals involved –our students, faculty, and staff – is a crucial responsibility.

How institutions can best respond to this challenge was the focus of a recent NACCU webinar and article  featuring by Erin Williams, Manager of Access & Privacy at the University of Calgary. Her message was clear: protecting data requires more than security controls – it demands strong information governance.

Understanding the role of information governance for campus card programs

Information governance (IG) is the overarching framework that connects people, processes, and technology across the entire lifecycle of data. It goes beyond security or compliance alone, encompassing how information is created, stored, used, shared, retained, and ultimately destroyed.

“It is how we manage information and data in a way that complies with required regulations and best practices,” says Williams. “Think of it as like the rules of the road or the guardrails.”

Technology evolves faster than legislation, and campuses that lead with strong governance will be better positioned to meet both current and future requirements.

One part of that framework, data governance, focuses on structure and standards that protect individual privacy.

“Data governance is a subset of information governance that focuses on specifics like data quality and access,” she explains. “This role is often housed often in IT because they're usually the ones that manage the infrastructure, architecture, and data warehouses.”

Another part, security, provides the technical and administrative safeguards. While these disciplines are often discussed separately, Williams suggests that they must function together to build trust and reduce risk.

A key takeaway from the webinar was the need for a proactive mindset. Rather than waiting for regulations to dictate action, institutions should adopt best practices early. Technology evolves faster than legislation, and campuses that lead with strong governance will be better positioned to meet both current and future requirements.

Why campus card systems present unique risks

Campus card environments are particularly challenging to govern due to their complexity. Both their reach and data are often decentralized, involving multiple departments with varying practices. At the same time, they are highly integrated, relying on third-party vendors and APIs that can introduce vulnerabilities.

Card offices frequently store data for extended periods “just in case,” which expands the potential impact of a breach.

Long data retention practices further increase risk. Card offices frequently store data for extended periods “just in case,” which expands the potential impact of a breach. The combination of decentralized ownership, deep integrations, and large data stores makes campus card systems attractive targets.

A practical roadmap for campus card information governance

The article outlines a pragmatic approach that campus card programs can implement without significant new resources. It begins with creating a simple system and data map that identifies key systems, the types of data they hold, and access controls. This foundational step enables better decision-making across the organization.

Many breaches originate from third-party vendors, so it essential to have clear requirements around data handling and security.

Next, institutions should strengthen procurement and integration processes. Many data incidents originate from third-party vendors, making it essential to establish clear requirements around data handling, security, and breach response.

Reducing unnecessary data retention is another high-impact step. Routine cleanup of exported reports and files, along with defined retention schedules, can significantly limit exposure.

Preparation is equally important. Conducting regular tabletop exercises helps teams understand how to respond to incidents before they occur. These simulations clarify roles, communication pathways, and technical responses in a controlled setting.

To learn more about information governance for your card program and explore a detailed 90-day step-by-step plan to improve information governance, check out the article and webinar.

Subscribe to our weekly newsletter

RECENT ARTICLES

Video camera with Visa Gift Card in foreground
Apr 09, 26 / ,

Join CampusIDNews for a video interview at NACCU and score a $50 visa gift card

Share your story with colleagues and peer institutions by participating in a 3-5 minute video interview during the NACCU Annual Conference. The CampusIDNews team will be conducting interviews with campus representatives in our exhibit hall booth (#116). Brag about your program, share something interesting your team has done, describe a challenge you are facing, or […]
interior hallway with security doors
Apr 07, 26 / ,

Beyond exterior locks: Strengthening campus security with interior corridor doors

A security threat has breached the exterior doors of a campus building – what now? In a modern security environment, electronic access control (EAC) can quickly, remotely close and lock doors to secure specific areas. This only works, however, at the enabled access points. Interior doors strengthen campus defense if an exterior door has been […]
Chef with food in AI scanner
Apr 02, 26 /

Measuring for a greener future: Why data is the cure for campus food waste

April 29 marks Stop Food Waste Day, a global movement that highlights a simple but powerful truth: what gets measured gets reduced. For campus leaders, this day serves as more than an environmental reminder. It is a strategic call to address the "data gap" in auxiliary services. While universities have digitized almost every other facet […]
CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.