Zusammenfassung der Ressource
How much does
your university
institution
protect your
identity?
- EMPLOYEE TRAINING
- DATA HANDLING:
Knowledge and steps
needed in handling
sensitive data
- RESPONSE TO DATA
LEAKAGE: Employee
knowledge of the
necessary actions
required when sensitive
data has been
exposed/misplaced
- GATHERING
APPROPRIATE DATA:
Only collecting and
viewing appropriate
data
- AWARENESS OF ALL
JOB
RESPOSIBILITIES:
Employee knowledge
of their own and their
colleagues'
permission in viewing
and handling sensitive
data.
- SYSTEM
UNDERSTANDING:
Job
appropriate
understanding
of
ICT
- UNDERSTANDING
OF DATA
SENSITIVITY:
Appreciation of the
importance of
sensitive data
- APPLICATION
UNDERSTANDING:
Understanding the ICT
tool being used, allows
employee to know the
most appropriate
program to be used in
recording relevant
student data
- LEGISLATION
- DATA PROTECTION ACTS:
National laws that dictate the
handling and distribution of
sensitive data
- SPECIFIC UNIVERSITY
POLICY: Reflect overall
university policy as well as
student role in protecting
personal data
- CYBER SECURITY:
Legal protection of
technology within
the university
- DATA TYPE
- Institution is only
collecting required
data
- Knowledge of how to
handle the different
types of data e.g.
sexual orientations
vs. test scores
- DATA STORAGE: Where/How is data stored?
- SYSTEM ACCESS:
Who has access to
what systems? At what
level?
- DATA
RETENTION:
Handling of
inactive data
within the system
- DURATION: How long
is
non-required/essential
sensitive data kept?
- DISPOSAL: What
safety precautions are
put in place to ensure
the secure and
permanent disposal of
sensitive data?
- STORAGE
METHOD:
Application used
to store data
- DATA/INFORMATION
ACCESS:
File
access
- THIRD PARTY ACCESS:
The ability for
unauthorized persons or
companies to
view/change data