Data Protection
About
Users must comply with all University policies and standards for the data to which they have been granted the ability to view, copy, generate, transmit, store, download, or otherwise acquire, access, remove, or destroy. Users must also meet any additional compliance requirements for data protection stipulated by various governmental, legal, or contractual entities.
Policy
Data Protection of University Information (IRM-003) [1]
Standards
Electronically Stored Information Release [3]
Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media [4]
Protection of Highly Sensitive Data Standard [5]
University Data Protection Standards (UDPS 3.0) [6]
University Use of Highly Sensitive Data [7] --> Replaced by Protection of Highly Sensitive Data Standard [5] and Protection of Highly Sensitive Data Procedures [8]
Vendor Security Review Standard [9]
Procedures
Electronic Data Removal Procedures [10]
Electronically Stored Information Release Procedures [11]
Highly Sensitive Data Protection Procedures for Individual-Use Electronic Devices or Media [12] >> Replaced by Highly Sensitive Data Protection Standard for Individual-Use Electronic Devices or Media [4]
Protection of Highly Sensitive Data Procedures [8]
Remediation of Highly Sensitive Data in Email (O365) [13]
External Assessment Review Procedures [14] > Replaced by Vendor Security Review Standard [9]
Procedures on the Use of Data Loss Prevention (DLP) Tools [15] No longer licensed.
Guidance
Electronically Stored Information Release - Guidance for Authorizing Officials [16]
Initiate an Information Security Compliance review [17]
Security Tools [18]