How much does your university institution protect your identity?

Description

Mind Map on How much does your university institution protect your identity?, created by cynthia.anyadi on 14/02/2016.
cynthia.anyadi
Mind Map by cynthia.anyadi, updated more than 1 year ago
cynthia.anyadi
Created by cynthia.anyadi about 8 years ago
10
0

Resource summary

How much does your university institution protect your identity?
  1. EMPLOYEE TRAINING
    1. DATA HANDLING: Knowledge and steps needed in handling sensitive data
      1. RESPONSE TO DATA LEAKAGE: Employee knowledge of the necessary actions required when sensitive data has been exposed/misplaced
        1. GATHERING APPROPRIATE DATA: Only collecting and viewing appropriate data
          1. AWARENESS OF ALL JOB RESPOSIBILITIES: Employee knowledge of their own and their colleagues' permission in viewing and handling sensitive data.
            1. SYSTEM UNDERSTANDING: Job appropriate understanding of ICT
              1. UNDERSTANDING OF DATA SENSITIVITY: Appreciation of the importance of sensitive data
                1. APPLICATION UNDERSTANDING: Understanding the ICT tool being used, allows employee to know the most appropriate program to be used in recording relevant student data
                2. LEGISLATION
                  1. DATA PROTECTION ACTS: National laws that dictate the handling and distribution of sensitive data
                    1. SPECIFIC UNIVERSITY POLICY: Reflect overall university policy as well as student role in protecting personal data
                      1. CYBER SECURITY: Legal protection of technology within the university
                      2. DATA TYPE
                        1. Institution is only collecting required data
                          1. Knowledge of how to handle the different types of data e.g. sexual orientations vs. test scores
                          2. DATA STORAGE: Where/How is data stored?
                            1. SYSTEM ACCESS: Who has access to what systems? At what level?
                              1. DATA RETENTION: Handling of inactive data within the system
                                1. DURATION: How long is non-required/essential sensitive data kept?
                                  1. DISPOSAL: What safety precautions are put in place to ensure the secure and permanent disposal of sensitive data?
                                  2. STORAGE METHOD: Application used to store data
                                    1. DATA/INFORMATION ACCESS: File access
                                      1. THIRD PARTY ACCESS: The ability for unauthorized persons or companies to view/change data
                                    Show full summary Hide full summary

                                    Similar

                                    OCR Biology AS level (f211) flashcards/revision notes
                                    Dariush Zarrabi
                                    C1, C2, C3 keywords
                                    Jessica Phillips
                                    Frankenstein by Mary Shelley
                                    nina.stuer14
                                    Biological Psychology - Stress
                                    Gurdev Manchanda
                                    GCSE AQA Biology 1 Adaptations, Competition & Environmental Change
                                    Lilac Potato
                                    GCSE Chemistry C4 (OCR)
                                    Usman Rauf
                                    Mind Maps with GoConqr
                                    croconnor
                                    History - Treaty of Versailles
                                    suhhyun98
                                    Memory-boosting tips for students
                                    Micheal Heffernan
                                    Types of Learning Environment
                                    Brandon Tuyuc
                                    Historical Context of The Handmaid's Tale
                                    Summer Pearce