Search4 Results

ThreatLocker has been deployed for the management of user permissions on university-owned laptops. The implementation of this software allows faculty and staff to continue to have the appropriate access they need to do their work while increasing security and reducing risk to the institution.
When purchasing third-party software or hardware, university personnel must obtain a HECVAT for the product from the vendor .
Appropriate security shall include, but is not limited to: protection of the privacy of information, protection of information against unauthorized modification or disclosure, protection of systems against denial of service, and protection of systems against unauthorized access.
The GLBA Safeguards Rule (16 CFR 314) (“the Rule”) requires the university to develop, implement, and monitor processes aimed at ensuring the security of certain nonpublic personal information obtained when the university offers or delivers (or offers or delivers on behalf of an affiliate) a customer a financial service or product.