A secure environment that allows you to store, share and collaborate with others both inside and outside the University
Box Secure Storage is a secure environment delivered by the Center of Excellence for HIPAA Data intended for storing, sharing and accessing sensitive and private-highly restricted files.
With Box Secure Storage, not only can you securely share files, you can also create, edit and review documents with others in real-time.
Security. Includes encryption, activity logging, Duo Two-Factor Authentication, and access controls such as view-only access. Our implementation of Box Secure Storage is specifically designed to be compliant with HIPAA and security standards for private-highly restricted data.
Collaboration. Invite anyone to view, edit and upload files with options for real-time and offline editing. Box Secure Storage automatically saves files, and offers options for version history.
File Access. Box Secure Storage provides unlimited storage capacity. Individual file size limit is set to 15 GB. Upload and access files via the web interface or via Box Sync, which allows you to edit Box files offline on your secure local device. Devices using Box Sync must use encryption, a firewall and antivirus software.
Edit Files Without Download. With Box Secure Storage, you can securely edit files with Microsoft Office online or use Box Edit to open files directly from the Box web interface with your local applications.
Optional Desktop Apps for Box
There are two desktop applications that give users the ability to access Box content from the user's desktop environment: Box Sync and Box Drive.
Request was withdrawn, reject, deferred, deprecated or not-prioritized by UMN DiaLOG Governance.
Future phase: Integrated
This tool is not integrated into Canvas as the request was withdrawn by the requester but this tool is ready and available to any current University of Minnesota faculty, staff, or student. See other resources on this page.
It is important that you familiarize yourself with the types of data entrusted to you, how you are accessing the data, and how you are storing the data. You are required to adhere to the University’s security policies,...