Practices for the Information Security Policy
Your data are valuable. In order to manage data security risks, units and University community members must ensure that their electronic devices and other resources which store, transmit, or process University information meet the information security processes and standards contained in the Information Security Policy.
What Is the Security Level of Your Data?
The University uses the following three-tier security system.
When is a Risk Assessment necessary?
University Information Security performs information security risk assessments to assist units in evaluating risks and treatment options as part of the University’s Information Security Risk Management (ISRM) program, or to satisfy legal and regulatory requirements. These risk assessments employ consistent University criteria and are scheduled based on level of risk. Units can also request a risk assessment of current or planned technologies or processes. Learn more about Risk Assessments.