Search5 Results
- Knowledge Base
- Security
The university is mandated by federal, state and/or local law, or university policy to enforce privacy and security safeguards for regulated data. This area of the Knowledgebase will help guide you through a general overview of regulated data-types at ISU. Please speak to your immediate supervisor for more information related to your role and responsibilities to meet regulatory compliance requirements when generating, storing, using, sharing, and managing regulated data.
- Knowledge Base
- Security
The Standard for ISU Email Security for Mobile Devices defines the centrally enforced security device policies required for use of ISU email on personal and ISU-owned mobile devices by ISU faculty, staff, and affiliates. These device policies are required in order for ISU to comply with both the Family Educational Rights and Privacy Act (FERPA) and Indiana Code (IC) 4-1-10.
- Knowledge Base
- Security
Digital safety is a shared responsibility. By remaining vigilant, adopting best practices, and staying informed, staff, faculty, and students can substantially reduce cyber risks and contribute to a safer, more secure higher education environment. Remember—cybersecurity is not only about technology; it’s about people, awareness, and proactive action.
- Knowledge Base
- Security
This article outlines the descriptions, permissions, and associated functionalities related to ISU data sensitivity labels, including Public Data, University Internal Data, Restricted Data, and Highly Restricted Data. By adhering to these guidelines, the university aims to enhance data security and management, ensuring that sensitive information is appropriately protected and accessible only to authorized individuals.
- Knowledge Base
- Security
AI is a new tool for generating content that must be used responsibly in terms of data security, its limitations, and the intellectual property of its outputs.