About this requirement
Date of last update:
April 15, 2024
Requirement Statement
The College IT staff will endeavor to continually educate the College community about the importance of data security and privacy and will publish materials to aid community members in identifying sensitive data types and use and outline best practices for handling data and securing devices.
In cases where access to critical and restricted data is required, supervisor verification of need and appropriate data owner or Data Steward approval must be acquired. College IT staff will work to ensure the data is compliant with IU policy and confidentiality, integrity and accessibility is maintained.
Exceptions to Requirement
NoneProcedures
- Data privacy and security info graphic card (PDF) is distributed to all current and new faculty and staff. This card is reviewed annually and revised as needed.
- IU IT Policy IT-07, Privacy of Electronic Information and Information Technology Resources will be posted at Service Desk locations
- Incident Response Policy text will be posted in College-occupied buildings
- Privacy newsletter published to College email distribution list quarterly
- All College IT group members will use the CAS+Duo authentication option for CAS-protected resources
- All College IT group members will review university and College IT policies at least annually
- Anti-Phishing training will be conducted annually and for new hires
- Critical Data is stored only on approved devices and transferred across the network only with strong encryption
- All College laptops are must be setup with full disk encryption before being released to end users
- Backups of central file servers are sent to UITS backup services with encryption.
- Approval to access critical and restricted data will be documented internally per College IT Operating Procedures: Problem Resolution and Service Desk including appropriate approvals.
References:
- IU KB: How can I securely wipe disk drives?
- IU KB: At IU, how should my department dispose of old computer equipment?
- IU IT Policy: IT-07 Privacy of electronic information and information technology resources
- Protect IU: Secure data removal
- Data management at IU
- Data Management Policies
- Types of data
- Critical data guide
- Tools for managing data
- College IT Requirement: Incident response
- IU KB: CAS + DUO - two step login
