Data Security (From the
Office of Information Technology)
In general, data that is considered of low and intermediate sensitivity can be secured by investigators with minimal training. Plans to acquire data that is considered of high or very high sensitivity must be developed in collaboration with the college IT Director or designee.
Examples of data with different levels of sensitivity and appropriate security controls
College IT Directors (Key Technical Resources)
How to encrypt flash/thumb drives