IT Security Info and Plans (e.g. administrative passwords, network diagrams)

Information that is generated as a result of automated or manual processes that are intended to safeguard the university’s IT resources. It includes settings, configurations, reports, log data and other information that supports IT security operations.

Institutional data may not be shared unless it is required by an authorized user’s assigned duties. Individuals with access to IT Security information must follow all rules set forth for integrity and confidentiality of information.

Examples

  • IT security program plans
  • IT security incident information
  • Access and authentication logs
  • Firewall rules

Additional Information

Information Technology Services Main Page

Protection Level

P3