...
Sub-Step | Tips | Resource | Resource Type |
---|---|---|---|
5.1 Access Management | Determining who can access the data, and what they can do with it. | EDUCAUSE | |
5.2 Physical Security |
| EDUCAUSE | |
5.3 Risk Assessment |
| EDUCAUSE | |
5.4 Change Management Requirements |
| Higher Education | |
5.5 Training |
| EDUCAUSE | |
|
| Higher Education | |
5.6 Need for Policy and Procedures |
| EDUCAUSE | |
5.7 Need for Encryption | Determining how data is appropriately secured both while at rest (in storage) and in transmission. | EDUCAUSE | |
5.8 Records Retention | Determining how long each type of data should be stored. | Higher Education | |
5.9 Data Incident Handling and Response | Determining what happens if/when data is lost, stolen, or compromised. | Confidential Data Handling Blueprint | EDUCAUSE |
Top of page
Questions or comments? Contact us.
...