How much does your university institution protect your identity?

Beschreibung

Mindmap am How much does your university institution protect your identity?, erstellt von cynthia.anyadi am 14/02/2016.
cynthia.anyadi
Mindmap von cynthia.anyadi, aktualisiert more than 1 year ago
cynthia.anyadi
Erstellt von cynthia.anyadi vor fast 9 Jahre
11
0

Zusammenfassung der Ressource

How much does your university institution protect your identity?
  1. EMPLOYEE TRAINING
    1. DATA HANDLING: Knowledge and steps needed in handling sensitive data
      1. RESPONSE TO DATA LEAKAGE: Employee knowledge of the necessary actions required when sensitive data has been exposed/misplaced
        1. GATHERING APPROPRIATE DATA: Only collecting and viewing appropriate data
          1. AWARENESS OF ALL JOB RESPOSIBILITIES: Employee knowledge of their own and their colleagues' permission in viewing and handling sensitive data.
            1. SYSTEM UNDERSTANDING: Job appropriate understanding of ICT
              1. UNDERSTANDING OF DATA SENSITIVITY: Appreciation of the importance of sensitive data
                1. APPLICATION UNDERSTANDING: Understanding the ICT tool being used, allows employee to know the most appropriate program to be used in recording relevant student data
                2. LEGISLATION
                  1. DATA PROTECTION ACTS: National laws that dictate the handling and distribution of sensitive data
                    1. SPECIFIC UNIVERSITY POLICY: Reflect overall university policy as well as student role in protecting personal data
                      1. CYBER SECURITY: Legal protection of technology within the university
                      2. DATA TYPE
                        1. Institution is only collecting required data
                          1. Knowledge of how to handle the different types of data e.g. sexual orientations vs. test scores
                          2. DATA STORAGE: Where/How is data stored?
                            1. SYSTEM ACCESS: Who has access to what systems? At what level?
                              1. DATA RETENTION: Handling of inactive data within the system
                                1. DURATION: How long is non-required/essential sensitive data kept?
                                  1. DISPOSAL: What safety precautions are put in place to ensure the secure and permanent disposal of sensitive data?
                                  2. STORAGE METHOD: Application used to store data
                                    1. DATA/INFORMATION ACCESS: File access
                                      1. THIRD PARTY ACCESS: The ability for unauthorized persons or companies to view/change data
                                    Zusammenfassung anzeigen Zusammenfassung ausblenden

                                    ähnlicher Inhalt

                                    Altenpflege Prüfungsfragen
                                    anna.grillborzer0656
                                    Öff.Recht - POR Streitigkeiten
                                    myJurazone
                                    Integralrechnung
                                    vincent.wegas
                                    EVA - Vorbereitung MC Teil
                                    hans urst
                                    Vetie - Tierzucht & Genetik - S VI
                                    Fioras Hu
                                    Forstpolitik Krott
                                    Ulf Grätz
                                    Vetie - Pharma 2017
                                    Fioras Hu
                                    Vetie Immunologie Eingangsklausur WS 2012/2013
                                    T .L
                                    Vetie - Pharma Übungsfragen 2019
                                    E. König
                                    Vetie - Berufsrecht 2020 (Matrikel 15)
                                    Jana r
                                    Vetie-Ethologie und Tierschutz 2021
                                    Carolina Heide