Search Information Security site

 

Electronic Data Removal Policy Procedural Details

This page provides the details for the procedures referenced by the University Electronic Data Removal Policy.

NOTE: Any electronic devices or media awaiting processing under these procedures must be securely stored, for example, in a locked closet, office or drawer, and should never be left unattended in a public area. Devices and media must be surplussed promptly following removal from service.

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security Office will evaluate the report and provide a full investigation.

Complete Report Form