Definitions

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

View All

Character classes

Character classes: For the purposes of authentication and password complexity, there are four possible character classes: 

  • Upper case alphabetic (e.g. A-Z)
  • Lower case alphabetic (e.g. a-z)
  • Numeric (e.g. 0-9)
  • Special characters (e.g.!@#$%~).

A password with all four character classes might be:  "Always b3 Secure.

  1. it has upper case alphabetic: "A" and "S"
  2. it has lower case alphabetic: "always b ecure"
  3. it has a number: "3"
  4. it has a special character: "." (period)


Classified Data

Classified Data, as defined in UVA policy, IRM-003: Data Protection of University Information, are: Data whose sensitivity level falls within a hierarchical schema established by the federal government according to the degree to which unauthorized disclosure would damage national security.  Access to classified data typically requires a formal security clearance level relative to the sensitivity of the classified data for which the access is requested.  Ranging from most sensitive to least, those levels include Top Secret, Secret, Confidential, and Public Trust. The misuse of classified data may incur criminal penalties and significant reputational damage.


Compensating Controls

Additional protective controls, beyond baseline security measures, put in place on a workstation to offset a specific increase in data security risk.


Contractor Employee

An individual who is an employee of a firm that has a formal contractual relationship with the University and has been assigned to work at the University for the duration of the contract.


Controlled Data

Data that is a public record available to anyone in accordance with the Virginia Freedom of Information Act but is also not intentionally made public (see the definition of public data).  Examples include salary information, employee name and title, meeting minutes, specific e-mail messages (for a complete list, see Code of Virginia § 2.2-3700 Virginia Freedom of Information Act).


Controlled Technology

For purposes of this policy, this term includes any item, component, material, software, source code, object code, or other commodity specifically identified on the Commerce Control List [Part 774 of the Export Administration Regulations (EAR)] or U.S. Munitions List [Part 121 of the International Traffic in Arms Regulations (ITAR)]. This term also includes information to the extent required in the applicable regulation.