When dealing with P3-P4 data, keeping it secure is a top priority. Compromised or leaked data can lead to disastrous consequences involving shame, regret, and a ridiculous number of lawyers. This is no joke.
- P3 data consists of Student Education Records (protected by FERPA), IT Security Information and Plans, UC Personnel Records, and other confidential information.
- P4 data includes Financial Records, Credit Card, Financial Aid, Payroll, Personally Identifiable Info (PII), Social Security Numbers, and other sensitive information.
The following guidelines apply to everything containing P3 or P4 data. From data stored or accessed on computers (including mobile devices) to hardcopies.
Start Here
Before even thinking about working with P3-P4 data, you must comply with minimum security standards for any devices connected to UC networks or working with UC data. This applies to all protection levels (P1-P4 data). If you have any questions, submit a ticket to the ITS Support Center for assistance.
Accessing the Data
Before accessing P3-P4 data, ensure that you have the proper authorization and training. It is important to know what kind of information is P3-P4 data so you know how to handle it. Visit Data Protection to find out more about what types of information falls under these categories.
Protecting the Data
When it comes to storing information, make sure the location is authorized for the protection level of the data.
- Google Apps are approved to store P3 but NOT P4 data.
- UC provides storage methods to handle the security for you, learn more about Data Center storage options.
- For any non-UC approved storage options, you are responsible to ensure all security controls are in place.
Refrain from taking and sharing screenshots, faxing, or printing when possible. All hard copies should be stored in locked environments. All digital files must be encrypted whether they are being transmitted or at rest.
Sharing the Data
- When sharing P3-P4 data first be sure that the person you are sharing it with is authorized to access this information.
- Do not forward, add to, or respond to an email message with P3-P4 information and read the whole email before sending it. If the person you are contacting does not need the data, do not share it with them.
- When transmitting P3-P4 data contact the ITS Support Center for secure file transfer options. Do not share over unencrypted wireless. Use eduroam when on campus and campus VPN everywhere else.
Disposal
Whether you are disposing hard copies of data or removing data from a device you are getting rid of, the procedure is the same. Data must be disposed of immediately when it is no longer in use. For more information, refer to UC Institutional Information Disposal Standard.
Reporting
First and foremost you must report all security incidents, known or suspected, to ITS regardless of the type of data and your authorization. The sooner Information Security is aware of an issue, the sooner we can address and mitigate any impacts. Visit the Report a Security Incident to learn what counts as a security incident and how to report it.
Consequences
Failure to comply and follow security rules for protecting P3-P4 data could result in serious consequences. Students and employees trust us with their data, we not only risk the privacy of these individuals but also fines, lost data, reputational risks, and more. If P4 data is inappropriately released, CA state law requires the individual that the data pertains to be officially notified.
Resources
Confidentiality of Electronic Research Data
Personally Identifiable Information (PII) Training
HIPAA Security Rule Information
Habitu8 Explains Stuff - Clean Desk Policy by Habitu8, The Security Awareness Video Company (1:07)