policy:data_privacy:access_contro
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
policy:data_privacy:access_contro [2019/05/21 19:45] – tonyromero | policy:data_privacy:access_contro [2019/06/13 17:29] (current) – tonyromero | ||
---|---|---|---|
Line 3: | Line 3: | ||
==== University of Colorado IT Security Program Policy ==== | ==== University of Colorado IT Security Program Policy ==== | ||
- | All data and information resources of the SEHD are subject to University of Colorado' | + | All data and information resources of the SEHD are subject to University of Colorado' |
> Although students, faculty, and staff require access to University information resources for academic and business purposes, this access must be limited to what is needed for his/her work. Use of resources beyond that which is authorized results in unnecessary risks to University information with no corresponding academic or business value. | > Although students, faculty, and staff require access to University information resources for academic and business purposes, this access must be limited to what is needed for his/her work. Use of resources beyond that which is authorized results in unnecessary risks to University information with no corresponding academic or business value. | ||
- | ==== University of Colorado Denver | + | ==== University of Colorado Denver HIPPA Policy ==== |
- | As applicable, the most secure SEHD data are subject to the UCD Workforce [[http:// | + | As applicable, the most secure SEHD data are subject to the UCD Workforce [[http:// |
> The UCD Information Technology Services Department (ITS) offers central disk storage and backup services which many departments and units use for maintaining their data. While central ITS systems meet the HIPAA physical security and contingency planning requirements, | > The UCD Information Technology Services Department (ITS) offers central disk storage and backup services which many departments and units use for maintaining their data. While central ITS systems meet the HIPAA physical security and contingency planning requirements, | ||
Line 15: | Line 15: | ||
==== Access to the SEHD Secure Data Server ==== | ==== Access to the SEHD Secure Data Server ==== | ||
- | Only appropriately identified, validated and authorized individuals will have access to the SEHD secure datawarehouse. | + | Only appropriately identified, validated and authorized individuals will have access to the SEHD Secure Server. |
To gain access a user must complete the following. | To gain access a user must complete the following. | ||
Line 37: | Line 37: | ||
* Remove the data user's access in the event of a breach that endangers the security of the Data Server. | * Remove the data user's access in the event of a breach that endangers the security of the Data Server. | ||
* On an annual basis review all user's that have access and modify or remove access as necessary. | * On an annual basis review all user's that have access and modify or remove access as necessary. | ||
- | * Maintain an auditable trail of requests, | + | * Maintain an auditable trail of requests, |
policy/data_privacy/access_contro.1558467959.txt.gz · Last modified: 2019/05/21 19:45 by tonyromero