Data Protection

About

Users must comply with all University policies and standards for the data to which they have been granted the ability to view, copy, generate, transmit, store, download, or otherwise acquire, access, remove, or destroy. Users must also meet any additional compliance requirements for data protection stipulated by various governmental, legal, or contractual entities.

Policy

Data Protection of University Information (IRM-003)

Standards

Electronic Data Removal

Electronically Stored Information Release

Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media

Protection of Highly Sensitive Data Standard

University Data Protection Standards (UDPS 3.0)

University Use of Highly Sensitive Data --> Replaced by Protection of Highly Sensitive Data Standard and Protection of Highly Sensitive Data Procedures

Vendor Security Review Standard

Procedures

Electronic Data Removal Procedures

Electronically Stored Information Release Procedures

Highly Sensitive Data Protection Procedures for Individual-Use Electronic Devices or Media  >> Replaced by Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media

Protection of Highly Sensitive Data Procedures

Remediation of Highly Sensitive Data in Email (O365)

External Assessment Review Procedures > Replaced by Vendor Security Review Standard

Procedures on the Use of Data Loss Prevention (DLP) Tools   No longer licensed.

Guidance

Electronically Stored Information Release - Guidance for Authorizing Officials

Initiate an Information Security Compliance review

Security Tools