Cloud Computing

Tell a friend about this page.
All fields required.
Can be sent to only one email address at a time.
Share Facebook Icon Twitter Icon

Cloud Computing and ECU Data


ECU data cannot be stored external to the university network (in the "cloud") without the proper authorization and approval of the department head, data owner, and CIO (Chief Information Officer).

What is Cloud Computing?


Cloud computing is the delivery of hosted services over the Internet. One example is data storage using an outside company's servers and hardware. Software hosting is another use. A cloud service can be public (see the examples below) or privately-hosted on a company's internal network.

Examples of some popular public cloud services include:

  • Amazon Cloud Drive
  • Google Mail cloud services
  • IBM Big Blue cloud platform
  • Dropbox file storage/sharing
  • Microsoft Live
  • sponsored research programs

Why Do I Need Authorization?


While simple to use, and in many cases, free, these services may not meet university standards for user privacy, security, intellectual property protection, unfettered access, records retention, etc. Many involve the user committing to some type of service agreement (Terms of Use) and clicking an "I Accept" button. This acceptance by users on behalf of ECU could lead to legal, privacy and security issues for ECU and is in direct violation of the "Delegation of Authority to Sign Contracts" regulation. The level of security provided by any cloud computing service provider must demonstrate the minimum acceptable security level established by ECU.

Examples of Educational Cloud Tools and Services


  • Educational assessment tools
  • Clicker-type response apps
  • Screen capture recording software or app
  • Educational games
  • File storage
  • Drop Box
  • Student presentation tools
  • Student portfolios
  • Collaboration tools including blogs, wikis and journals
  • Note taking apps
  • Personal email accounts (Gmail, Hotmail, Yahoo, etc.)
  • Any other tool that stores student data external to ECU

How Does This Affect Me?


If you store ECU data externally with a service provider who utilizes a non-ECU IT infrastructure with resources that are not maintained, owned or managed by ECU—like the example services above—you must remove that data from this service and store it in ECU-maintained network storage or ECU Exchange.


What ECU Storage is Available?


ECU-maintained network storage includes Piratedrive and ECU Outside. Every faculty, staff and student has a secure, 40GB Piratedrive storage folder on ECU's network; departments can also request a 50GB piratedrive folder. ECU Outside is a file transfer protocol (FTP) server designed specifically for ECU faculty and staff to share information with non-ECU collaborators.

Contact the IT Help Desk at 252.328.9866/1.800.340.7081 to request storage or a consult to find the most efficient storage method for your data.


Are There Guidelines?


  • All cloud computing services shall be approved by the Chief Information Officer (CIO) or designee prior to purchase
  • All cloud computing service contracts must be reviewed by ECU Materials Management
  • Users must have appropriate authority to accept the terms of use as specified by the "Delegation of Authority to Sign Contracts" regulation, prior to entering into a contract
  • No confidential data shall be placed in the cloud without department head, data owner and CIO approval
  • ECU ensures that individuals with disabilities have access to reasonable accommodation and services and adheres to the requirements and philosophy of the Americans with Disabilities Act (ADA) and Section 504 of the Rehabilitation Act of 1973. Technology must meet ADA requirements. To ensure the cloud technology you are considering meets ADA requirements, please consult with the Department for Disability Support Services prior to purchase or use. For consultation, please contact Michael Thompson at 252.737.1025 or thompsonmi@ecu.edu.
If you have data stored externally, contact the IT Help Desk to request a consult in how best to move the data back onto ECU approved storage.

How About Privacy and Data Security Best Practices?


  • Never divulge information on the Internet that the university has classified as confidential. Examples include social security numbers, credit card information, and driver's license numbers
  • Comply with FERPA requirements to protect student privacy. Do not place grades or evaluative comments on Internet sites. Contact the Office of the Registrar at 252-328-6747 for assistance interpreting FERPA
  • Comply with HIPAA Privacy requirements to protect PHI. Never place HIPAA data on Internet sites. Contact the HIPAA Privacy Office at 252.744.5200 or HIPAA Security Office at 252.328.9866 for assistance in interpreting HIPAA privacy or HIPAA security
  • Never use personally identifying information (PII) without explicit permission, unless the university has classified the information to be public. For example, in the university directory ("Search People")
  • Ensure that the cloud computing service provider can meet and will agree to the requirements in the ECU Data Compliance Document. Prior to selecting the provider, contact the ITCS Helpdesk at 252.328.9866 for assistance
  • Never agree to terms and conditions for a cloud service to store, transmit, process or back up ECU information. Binding contracts can only be signed by authorized university officials
  • Schedule an ITCS review at 252.328.9866 prior to making a decision to use a cloud computing service provider

Are There Data Availability and Records Retention Best Practices?


  • Ensure that all records—whether instructional, administrative or research—can be retained in the cloud solution as specified by the records retention schedule. See ECU Data Retention Schedule
  • Ensure that the cloud service provider meets the unfettered access requirement by consulting with Materials Management and request that the hosted services compliance memorandum of understanding be included in the contract prior to acceptance
  • Ensure data backup requirements are documented into the contract and include a tested recovery plan to ensure records are available when needed, as many providers assume no responsibility for data-recovery of content
  • If you perform your own data backup, ensure procedures are documented and tested, and the same security controls are included in the backup solution

back to the top

Contact US

East Carolina University
209 Cotanche Street | Greenville, NC 27858
252.328.9000 | Contact Us
© 2014 | Terms of Use | Last Updated: 2014-04-23
Give To East Carolina University