|Policy:||The Rules and Policies of Data Management|
Classification of Institutional Data
Data Management Policies
Acceptable Use Agreement
|Things to Know:||Updated to add pertinent websites and training - April 3, 2019 |
Critical data is a type of data that imposes significant risks, especially when mishandled, therefore:
Documents that have to be initiated or approved such as KFS documents, travel, purchasing and HRMS must be doubled checked to see whether or not they contain critical data.
No scanned copies of checks from non-IU sources should be kept, please dispose of them by shredding the document.
No Social Security Numbers (SSN) on supporting documentation or on the document as content.
Visit the following websites for further information:
- Critical Data Guide
- Data Sharing and Handling Tool (DSH)
- Security Center IT Policies (DM-01, DM-02 are particularly relevant)
- Standard policy (DM-01-S) supporting DM-01 - has a lot of helpful info
- EIG (Enterprise Information Governance)
See related CATS presentations below for more critical data examples, how to report it and to ensure that internal controls are in place.
Fill out the FMS Support Form if you have questions or concerns.
REMINDER: The Personal Profile Form (ED) is used by all campuses for all hires. It states at the top of the form that it should be shredded after the HR eDoc has been approved.
Two Step Log In is required at every CAS authentication to prevent phishing scams and data breach for all employees and affiliates, including retirees, non-paid faculty, and student employees. See 2 Step Login Access CATS presentation below.
Critical Data in KFS Training:
Information about the new KFS training requirements, including a list of Frequently Asked Questions is available on this FMS link: Critical Data in KFS Training.
For questions or concerns, send an email to email@example.com.
Protect IU: General concepts about sensitive data
Adobe Acrobat Redaction Help
Critical Data Memorandum
University Policies Website