Data Protection
About
Users must comply with all University policies and standards for the data to which they have been granted the ability to view, copy, generate, transmit, store, download, or otherwise acquire, access, remove, or destroy. Users must also meet any additional compliance requirements for data protection stipulated by various governmental, legal, or contractual entities.
Policy
Data Protection of University Information (IRM-003) [1]
Standards
Electronically Stored Information Release [3]
Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media [4]
University Data Protection Standards (UDPS 3.0) [5]
University Use of Highly Sensitive Data [6]
Vendor Security Review Standard [7]
Procedures
Electronic Data Removal Procedures [8]
Electronically Stored Information Release Procedures [9]
External Assessment Review Procedures [10] > Replaced by Vendor Security Review Standard [7]
Highly Sensitive Data Protection Procedures for Individual-Use Electronic Devices or Media [11] >> Replaced by Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media [4]
Procedures on the Use of Data Loss Prevention (DLP) Tools [12]
Initiate an Information Security Compliance review [13]
Guidance
Electronically Stored Information Release - Guidance for Authorizing Officials [14]
Security Tools [15]