TE - Security Secure Data Handling Practices

GENERAL DESCRIPTION:

These guidelines provide direction on securely handling high risk data.

PROCESS CONSIDERATIONS:

You may click on the links below to navigate directly to a section:


Updating

Only update information within HRS that you have a legitimate business need to modify.

Viewing

Do not display high risk data in an environment where it may be viewed by unauthorized individuals.

Duplicating

Any document containing high risk data must not be duplicated physically or electronically and further distributed without permission of your Campus Data Custodian.

Printing

When printing documents that contain high risk data ensure that only authorized personnel will be able to see the output.

Storing

Any high risk data stored outside of HRS should be stored securely and deleted when no longer needed. 

How to securely store data:

Sending/Receiving

Guidelines for securely sending/receiving high risk data:

Destroying/Deleting

All copies of high risk data should be destroyed when no longer needed. How to securely destroy or delete high risk data:



ADDITIONAL RESOURCES

Related KBs:

Related Links:

To the top