How much does
your university
institution
protect your
identity?
EMPLOYEE TRAINING
DATA HANDLING:
Knowledge and steps
needed in handling
sensitive data
RESPONSE TO DATA
LEAKAGE: Employee
knowledge of the
necessary actions
required when sensitive
data has been
exposed/misplaced
GATHERING
APPROPRIATE DATA:
Only collecting and
viewing appropriate
data
AWARENESS OF ALL
JOB
RESPOSIBILITIES:
Employee knowledge
of their own and their
colleagues'
permission in viewing
and handling sensitive
data.
SYSTEM
UNDERSTANDING:
Job
appropriate
understanding
of
ICT
UNDERSTANDING
OF DATA
SENSITIVITY:
Appreciation of the
importance of
sensitive data
APPLICATION
UNDERSTANDING:
Understanding the ICT
tool being used, allows
employee to know the
most appropriate
program to be used in
recording relevant
student data
LEGISLATION
DATA PROTECTION ACTS:
National laws that dictate the
handling and distribution of
sensitive data
SPECIFIC UNIVERSITY
POLICY: Reflect overall
university policy as well as
student role in protecting
personal data
CYBER SECURITY:
Legal protection of
technology within
the university
DATA TYPE
Institution is only
collecting required
data
Knowledge of how to
handle the different
types of data e.g.
sexual orientations
vs. test scores
DATA STORAGE: Where/How is data stored?
SYSTEM ACCESS:
Who has access to
what systems? At what
level?
DATA
RETENTION:
Handling of
inactive data
within the system
DURATION: How long
is
non-required/essential
sensitive data kept?
DISPOSAL: What
safety precautions are
put in place to ensure
the secure and
permanent disposal of
sensitive data?
STORAGE
METHOD:
Application used
to store data
DATA/INFORMATION
ACCESS:
File
access
THIRD PARTY ACCESS:
The ability for
unauthorized persons or
companies to
view/change data