Search4 Results
- Knowledge Base
- Security
- Safeguarding Data and Devices
ThreatLocker has been deployed for the management of user permissions on university-owned laptops. The implementation of this software allows faculty and staff to continue to have the appropriate access they need to do their work while increasing security and reducing risk to the institution.
- Knowledge Base
- Security
When purchasing third-party software or hardware, university personnel must obtain a HECVAT for the product from the vendor .
- Knowledge Base
- Security
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
- Knowledge Base
- Security
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.