1. hands typing on a keyboard with overlayed lock icons
    Maintaining and Handling Protected Data

    This article discusses maintaining and handling protected data, including how to an internal or third-party breach.

  2. Career services professionals discuss who gets access to first-destination survey data.
    Case Study: Whose Data Is It Anyway?

    A career center compiles first-destination survey data; other offices on campus want access to the raw data.

  3. Two business professionals discuss how to handle a date breach by one of their third-party vendors.
    Handling a Data Breach by a Third-Party Vendor

    When a data breach comes from a third-party vendor, both the vendor and the party that provided the initial information may be subject to potential liability.

  4. A young man researches a potential employer to ensure it isn't fraudulent.
    Fraudulent Employers: Tips for Career Centers and Students

    Career centers and students must be vigilant about fraudulent employers and should identify steps to take to verify the legitimacy of an employer.

  5. Five people sitting around a table
    Diversity Hiring and Authenticity at Work

    Many employers have embraced the idea of authenticity at work, but career services must work with students to anticipate and navigate challenges should these employer efforts still fall short.

  6. Three people in conversation
    Reframing Authenticity

    Many employers encourage employees to bring their “authentic” selves to work, but it should ultimately be up to the employee to determine how much of themselves to share.

  7. Teacher counseling student
    Case Study: Confidentiality of Student Advising/Coaching

    A student’s identifiable demographics are sent via email by career center staff and shared with others outside of the university. Besides the legal implications, such a scenario has ethical implications, which are addressed by the NACE Principles for Ethical Professional Practice.