policy:data_privacy:reporting_problems
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
policy:data_privacy:reporting_problems [2019/03/28 17:47] – tonyromero | policy:data_privacy:reporting_problems [2019/06/05 19:26] (current) – [University of Colorado Denver Security Management HIPPA Policy] tonyromero | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Reporting Potential Problems in Privacy and Security ====== | ====== Reporting Potential Problems in Privacy and Security ====== | ||
- | - | + | ===== Applicable University of Colorado Denver Policies ===== |
- | APS-6005 [[https:// | + | ==== University of Colorado IT Security Program Policy ==== |
- | | + | All data and information resources of the SEHD are subject to University of Colorado' |
- | University | + | > IT resource users shall report security related events; known or suspected violations of IT security policy; and inappropriate, |
- | ===== Sub Heading ===== | + | ==== University of Colorado Denver HIPPA Policy |
- | :!: **Important: | + | The most secure SEHD data are subject to the [[http://www.ucdenver.edu/ |
- | **Note:** Lorem ipsum dolor sit amet, consectetur adipiscing elit. | + | If there is a suspected violation email [[HIPAA@UCDenver.edu​|HIPAA@UCDenver.edu]] as soon as possible and please download and fill out [[http:// |
- | ===== Headline ===== | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | ==== SEHD Secure Data Server Reporting ==== |
- | ---- | + | Any individual that will report any known security related events as outlined in University of Colorado's IT Security Program policy related |
- | + | ||
- | ===== Various Underlines ===== | + | |
- | + | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | |
- | + | ||
- | ===== List Items ===== | + | |
- | + | ||
- | - One | + | |
- | - something | + | |
- | - three | + | |
- | - eleven | + | |
- | - five hundred((I'm adding a footnote | + | |
- | + | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | |
- | + | ||
- | ---- | + | |
- | + | ||
- | ==== Slightly Lower Header ==== | + | |
- | + | ||
- | |We can also use tables|for describing various policies| | + | |
- | | | | | + | |
- | | | | | + | |
- | + | ||
- | \\ | + | |
policy/data_privacy/reporting_problems.1553795235.txt.gz · Last modified: 2019/03/28 17:47 by tonyromero