IT Security Information

Information that is generated as a result of automated or manual processes that are intended to safeguard the university’s IT resources. It includes settings, configurations, reports, log data and other information that supports IT security operations.

Institutional data may not be shared unless it is required by an authorized user’s assigned duties. Individuals with access to IT Security information must follow all rules set forth for integrity and confidentiality of information.

Examples: 
  • IT security program plans
  • IT security incident information
  • Access and authentication logs
  • Firewall rules