Storage of Electronic Data
Across
- 2. data,
- 4. storage,
- 6. incidents, Security incidents include but are not limited to the theft or loss of a computer device, the introduction of malicious software, or other misconfiguration that may lead to unauthorized access to confidential or sensitive information.
- 8. commit data as retrievable records.
- 10. may result in appropriate disciplinary action, up to and including termination, temporary or permanent restrictions on information access/networks, and criminal and/or civil action.
Down
- 1. by the university and maintained by ITS for the purpose of electronically retaining university data.
- 3. The university reserves the right to monitor network traffic, perform random audits and to take other steps to ensure the integrity of its information and compliance with this policy.
- 5. security incident, Individuals granted access to university data or information systems must report any known security incident or any incident that is likely to cause a disclosure of sensitive information to unauthorized parties by contacting the university’s tech desk.
- 7. and all data and records created, collected, stored and/or managed in connection with the operation and management of the university
- 9. Office,