policy:data_privacy:encryption
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policy:data_privacy:encryption [2019/03/28 19:25] – created tonyromero | policy:data_privacy:encryption [2019/06/07 17:48] (current) – tonyromero | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | Here's some formatting stuff to show off what a policy could look like. | + | ===== Applicable University of Colorado Denver Policies ===== |
- | ===== Sub Heading ===== | + | ==== University of Colorado IT Security Program Policy |
- | :!: **Important: | + | All data and information resources of the SEHD are subject to University of Colorado' |
- | **Note:** Lorem ipsum dolor sit amet, consectetur adipiscing elit. | + | > If Highly Confidential informationis stored on a workstation or mobile computing device or transmitted to an external network or organization, IT resource usersshall encrypt or adequately protect that information from disclosure. |
- | ===== Headline ===== | + | |
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | > Highly Confidential information stored on portable electronic media shall be encrypted or otherwise adequately protected based on security standards and guidance from the campus Information Security Officers. |
- | ---- | + | ==== University of Colorado Denver HIPPA Policy ==== |
- | ===== Various Underlines ===== | + | The most secure SEHD data are subject to the [[http:// |
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | * If e-mail must be sent across the Internet to either |
- | + | * Portable devices should be password protected and, where possible, the PHI data on the devices encrypted. | |
- | ===== List Items ===== | + | * Data transmitted over the internet. |
- | + | * UCD owned laptops must be encrypted | |
- | | + | |
- | - something | + | |
- | - three | + | |
- | - eleven | + | |
- | - five hundred((I' | + | |
- | + | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | |
- | + | ||
- | ---- | + | |
- | + | ||
- | ==== Slightly Lower Header ==== | + | |
- | + | ||
- | |We can also use tables|for describing various policies| | + | |
- | | | | | + | |
- | | | | | + | |
- | + | ||
- | \\ | + | |
policy/data_privacy/encryption.1553801104.txt.gz · Last modified: 2019/03/28 19:25 by tonyromero