Search This Site

 

Main menu

Data Protection

About

Users must comply with all University policies and standards for the data to which they have been granted the ability to view, copy, generate, transmit, store, download, or otherwise acquire, access, remove, or destroy. Users must also meet any additional compliance requirements for data protection stipulated by various governmental, legal, or contractual entities.

Policy

Data Protection of University Information (IRM-003)

Standards

Electronic Data Removal

Electronically Stored Information Release

Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media

Protection of Highly Sensitive Data Standard

University Data Protection Standards (UDPS 3.0)

University Use of Highly Sensitive Data --> Replaced by Protection of Highly Sensitive Data Standard and Protection of Highly Sensitive Data Procedures

Vendor Security Review Standard

Procedures

Electronic Data Removal Procedures

Electronically Stored Information Release Procedures

Protection of Highly Sensitive Data Procedures

External Assessment Review Procedures > Replaced by Vendor Security Review Standard

Highly Sensitive Data Protection Procedures for Individual-Use Electronic Devices or Media  >> Replaced by Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media

Procedures on the Use of Data Loss Prevention (DLP) Tools   No longer licensed.

Guidance

Electronically Stored Information Release - Guidance for Authorizing Officials

Initiate an Information Security Compliance review

Security Tools 

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form