Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand
titleWho was involved in selecting this software?

The group involved in the request for proposal (RFP) included representatives from multiple faculty IT units as well as IST staff from Information Security Services and Client Services.

Research

Expand
titleWhat if security stipulations regarding my research state such applications should not be used/installed?

SentinelOne monitors computer and network activity for behaviour that is consistent with cybersecurity threats. Devices are registered with SentinelOne using identifiers related to the device itself, not the individual(s) using the device. Information is only stored when a threat is detected, and an alert is generated. Personal information would only be stored when incidental to a cybersecurity alert. The collection and storage of any information related to an alert, including personal information, is vital to understand the impact of a potential breach, and necessary to comply with the University’s breach disclosure obligations (statutory and contractual).

Technical/IT administrator

...