Search5 Results

This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
ISU employees must follow security-related best practices. Such practices are common across many different computer environments, and apply on personal computers as well as ISU computers.
AI is a new tool for generating content that must be used responsibly in terms of data security, its limitations, and the intellectual property of its outputs.
OneDrive for Business article for data sharing and storage.
Current list of departmental security managers for Banner.