Practices for the Information Security Policy
Your data are valuable. In order to manage data security risks, units and University community members must ensure that their electronic devices and other resources which store, transmit, or process University information meet the information security processes and standards contained in the Information Security Policy.
Identify the Security Level of Your Data
The University uses the following three-tier security system.
A gap analysis is not the same as an Information Security Risk Assessment. Learn more about Risk Assessments.