Data Security

‚ÄčData Security (From the Office of Information Technology)

In general, data that is considered of low and intermediate sensitivity can be secured by investigators with minimal training. Plans to acquire data that is considered of high or very high sensitivity must be developed in collaboration with the college IT Director or designee.

Examples of data with different levels of sensitivity and appropriate security controls

College IT Directors (Key Technical Resources)

How to encrypt flash/thumb drives

IT Knowledge Base Information

updated 3/28/2020