Storage of Electronic Data

12345678910
Across
  1. 2. data,
  2. 4. storage,
  3. 6. incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
  4. 8. commit data as retrievable records.
  5. 10. may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
  1. 1. by the university and maintained by ITS for the purpose of electronically retaining university data.
  2. 3. The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
  3. 5. security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
  4. 7. and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
  5. 9. Office,