How much does your university institution protect your identity?

cynthia.anyadi
Mind Map by cynthia.anyadi, updated more than 1 year ago
cynthia.anyadi
Created by cynthia.anyadi about 4 years ago
2
0

Description

Mind Map on How much does your university institution protect your identity?, created by cynthia.anyadi on 02/14/2016.

Resource summary

How much does your university institution protect your identity?
1 EMPLOYEE TRAINING
1.1 DATA HANDLING: Knowledge and steps needed in handling sensitive data
1.2 RESPONSE TO DATA LEAKAGE: Employee knowledge of the necessary actions required when sensitive data has been exposed/misplaced
1.3 GATHERING APPROPRIATE DATA: Only collecting and viewing appropriate data
1.4 AWARENESS OF ALL JOB RESPOSIBILITIES: Employee knowledge of their own and their colleagues' permission in viewing and handling sensitive data.
1.5 SYSTEM UNDERSTANDING: Job appropriate understanding of ICT
1.6 UNDERSTANDING OF DATA SENSITIVITY: Appreciation of the importance of sensitive data
1.7 APPLICATION UNDERSTANDING: Understanding the ICT tool being used, allows employee to know the most appropriate program to be used in recording relevant student data
2 LEGISLATION
2.1 DATA PROTECTION ACTS: National laws that dictate the handling and distribution of sensitive data
2.2 SPECIFIC UNIVERSITY POLICY: Reflect overall university policy as well as student role in protecting personal data
2.3 CYBER SECURITY: Legal protection of technology within the university
3 DATA TYPE
3.1 Institution is only collecting required data
3.2 Knowledge of how to handle the different types of data e.g. sexual orientations vs. test scores
4 DATA STORAGE: Where/How is data stored?
4.1 SYSTEM ACCESS: Who has access to what systems? At what level?
4.2 DATA RETENTION: Handling of inactive data within the system
4.2.1 DURATION: How long is non-required/essential sensitive data kept?
4.2.2 DISPOSAL: What safety precautions are put in place to ensure the secure and permanent disposal of sensitive data?
4.3 STORAGE METHOD: Application used to store data
4.3.1 DATA/INFORMATION ACCESS: File access
4.3.2 THIRD PARTY ACCESS: The ability for unauthorized persons or companies to view/change data
Show full summary Hide full summary

Similar

10 Mind Mapping Strategies for Teachers
Andrea Leyden
Biology Unit 1
anna.mat1997
AS-Level Chemistry: Unit 1:The Atom
Daena Targaryen
ICT Revision 2014
11RaceyG
UNIT 1 DIGITAL MEDIA SECTORS AND AUDIENCES
carolyn ebanks
A Level Chemistry Unit 1 - Organic Chemistry
charlottehyde
Edexcel Additional Science Chemistry Topics 1+2
hchen8nrd
Crime and Punishment Flashcards - Edexcel GCSE Religious Studies Unit 8
nicolalennon12
AS level Maths Equations to Remember
Gurdev Manchanda
Psychopathology
Laura Louise
Salesforce Admin Exam Chunk 2 (31-65)
Brianne Wright