Search212 Results

Information to help you identify different classifications of data, which may require different technical controls.
Mitigations for use of temporary employees handling high risk data.
Overview, FAQ, and change log of the data security standards
This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.
Guidelines for configuring HTTP logging consistent with IT standards
Follow these tips to help keep your data, accounts, and the university secure!
The following locations have been approved by OIT for storage of university data, consistent with U of I policies and standards.
Having an @uidaho.edu and an @vandals.uidaho.edu is important for student employees at the University. It helps protect a students education-related data and keep University business separate to maintain official University records and comply with U of I policy (in APM 30.10).
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.