Search5 Results

The university is mandated by federal, state and/or local law, or university policy to enforce privacy and security safeguards for regulated data. This area of the Knowledgebase will help guide you through a general overview of regulated data-types at ISU. Please speak to your immediate supervisor for more information related to your role and responsibilities to meet regulatory compliance requirements when generating, storing, using, sharing, and managing regulated data.
The Standard for ISU Email Security for Mobile Devices defines the centrally enforced security device policies required for use of ISU email on personal and ISU-owned mobile devices by ISU faculty, staff, and affiliates. These device policies are required in order for ISU to comply with both the Family Educational Rights and Privacy Act (FERPA) and Indiana Code (IC) 4-1-10.
Digital safety is a shared responsibility. By remaining vigilant, adopting best practices, and staying informed, staff, faculty, and students can substantially reduce cyber risks and contribute to a safer, more secure higher education environment. Remember—cybersecurity is not only about technology; it’s about people, awareness, and proactive action.
This article outlines the descriptions, permissions, and associated functionalities related to ISU data sensitivity labels, including Public Data, University Internal Data, Restricted Data, and Highly Restricted Data. By adhering to these guidelines, the university aims to enhance data security and management, ensuring that sensitive information is appropriately protected and accessible only to authorized individuals.
AI is a new tool for generating content that must be used responsibly in terms of data security, its limitations, and the intellectual property of its outputs.