Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents:

...

  • Protection of Information: Regardless of device ownership, all employees are responsible for the security of University information to which they have access and should follow best practices for data security on their devices.

  • Awareness and Compliance:  Employees should be aware of this procedure and comply with it.  If an employee desires an exception to this procedure, they are to contact Information Security Services.

Info

Employees who do not use workstations managed by IST or Faculty IT teams are responsible for the encryption implementation and compliance assurance of their devices.

Information Security Services team (ISS)

...

Filter by label (Content by label)
showLabelsfalse
max5
spacesISTKB
showSpacefalse
sortmodified
typepage
titleRelated Articles
reversetrue
labelsencryption
cqllabel = "encryption" and type = "page" and space = "ISTKB"
Info

Need help?

Contact the IST Service Deskonline or 519-888-4567 ext. 44357.

Tip

Article feedback

If you’d like to share any feedback about this article, please let us know.

...