How much does your university institution protect your identity?

Descripción

Mapa Mental sobre How much does your university institution protect your identity?, creado por cynthia.anyadi el 14/02/2016.
cynthia.anyadi
Mapa Mental por cynthia.anyadi, actualizado hace más de 1 año
cynthia.anyadi
Creado por cynthia.anyadi hace más de 8 años
11
0

Resumen del Recurso

How much does your university institution protect your identity?
  1. EMPLOYEE TRAINING
    1. DATA HANDLING: Knowledge and steps needed in handling sensitive data
      1. RESPONSE TO DATA LEAKAGE: Employee knowledge of the necessary actions required when sensitive data has been exposed/misplaced
        1. GATHERING APPROPRIATE DATA: Only collecting and viewing appropriate data
          1. AWARENESS OF ALL JOB RESPOSIBILITIES: Employee knowledge of their own and their colleagues' permission in viewing and handling sensitive data.
            1. SYSTEM UNDERSTANDING: Job appropriate understanding of ICT
              1. UNDERSTANDING OF DATA SENSITIVITY: Appreciation of the importance of sensitive data
                1. APPLICATION UNDERSTANDING: Understanding the ICT tool being used, allows employee to know the most appropriate program to be used in recording relevant student data
                2. LEGISLATION
                  1. DATA PROTECTION ACTS: National laws that dictate the handling and distribution of sensitive data
                    1. SPECIFIC UNIVERSITY POLICY: Reflect overall university policy as well as student role in protecting personal data
                      1. CYBER SECURITY: Legal protection of technology within the university
                      2. DATA TYPE
                        1. Institution is only collecting required data
                          1. Knowledge of how to handle the different types of data e.g. sexual orientations vs. test scores
                          2. DATA STORAGE: Where/How is data stored?
                            1. SYSTEM ACCESS: Who has access to what systems? At what level?
                              1. DATA RETENTION: Handling of inactive data within the system
                                1. DURATION: How long is non-required/essential sensitive data kept?
                                  1. DISPOSAL: What safety precautions are put in place to ensure the secure and permanent disposal of sensitive data?
                                  2. STORAGE METHOD: Application used to store data
                                    1. DATA/INFORMATION ACCESS: File access
                                      1. THIRD PARTY ACCESS: The ability for unauthorized persons or companies to view/change data
                                    Mostrar resumen completo Ocultar resumen completo

                                    Similar

                                    Chino Mandarín Básico
                                    Diego Santos
                                    MONUMENTOS...
                                    JL Cadenas
                                    Crisis Hipertensivas
                                    jasiz
                                    Vocabulario unidad 13
                                    Laura Maestro
                                    English Test - Please choose one correct option for each sentence.
                                    tania.perez
                                    MICROECONOMÍA
                                    ingrinati
                                    EL ESPAÑOL COMO IDIOMA UNIVERSAL
                                    RICARDO ALFONSO PEÑA BEJARANO
                                    RESOLUCIÓN DE CONFLICTOS
                                    Kelly Maria
                                    Matemáticas - TERCERO Primaria - Multiplicación
                                    asx elearning
                                    Habilidades del Pensamiento
                                    Kimm Fdez
                                    Diagrama de Flujo Servicio de Peluqueria
                                    Ricardo Lugo