policy:data_privacy:security_training
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
policy:data_privacy:security_training [2019/05/21 19:47] – tonyromero | policy:data_privacy:security_training [2019/06/12 19:31] (current) – tonyromero | ||
---|---|---|---|
Line 3: | Line 3: | ||
==== University of Colorado IT Security Program Policy ==== | ==== University of Colorado IT Security Program Policy ==== | ||
- | All data and information resources of the SEHD are subject to University of Colorado' | + | All data and information resources of the SEHD are subject to University of Colorado' |
- Supervisors shall ensure that employees are adequately trained to fulfill their IT security responsibilities. Employees with elevated computing privileges (e.g., server support technicians, | - Supervisors shall ensure that employees are adequately trained to fulfill their IT security responsibilities. Employees with elevated computing privileges (e.g., server support technicians, | ||
Line 9: | Line 9: | ||
- Supervisors shall coordinate their local IT security training initiatives with the campus Information Security Office | - Supervisors shall coordinate their local IT security training initiatives with the campus Information Security Office | ||
- | Required information security Skillsoft Training (required in first three monts of employement): [[https:// | + | Required information security Skillsoft Training (required in first three months |
- | ==== University of Colorado Denver | + | ==== University of Colorado Denver HIPPA Policy ==== |
- | As applicable, the most secure SEHD data are subject to the UCD Training | + | As applicable, the most secure SEHD data are subject to the UCD [[http:// |
> <font 14px/ | > <font 14px/ | ||
Line 30: | Line 30: | ||
To gain access to SEHD's Secure Data Warehouse you must have completed the following courses within the past year. | To gain access to SEHD's Secure Data Warehouse you must have completed the following courses within the past year. | ||
- | [[https:// | + | - [[https:// |
- | + | | |
- | [[https:// | + | |
Then on an annual basis you must complete the following course. | Then on an annual basis you must complete the following course. | ||
policy/data_privacy/security_training.1558468032.txt.gz · Last modified: 2019/05/21 19:47 by tonyromero