Search209 Results
- Knowledge Base
- Data Security & Records
Mitigations for use of temporary employees handling high risk data.
- Knowledge Base
- IT Standards
Overview, FAQ, and change log of the data security standards
- Knowledge Base
- Data Security & Records
Information to help you identify different classifications of data, which may require different technical controls.
- Knowledge Base
- Data Security & Records
This guide describes the current settings enforced for High Risk data access on macOS, Windows, iOS, and Android.
- Knowledge Base
- Data Security & Records
Guidelines for configuring HTTP logging consistent with IT standards
- Knowledge Base
- Email, Messaging & Web
- Knowledge Base
- Administrative Applications
- Knowledge Base
- Data Security & Records
Follow these tips to help keep your data, accounts, and the university secure!
- Knowledge Base
- Data Security & Records
The following locations have been approved by OIT for storage of university data, consistent with U of I policies and standards.
- Knowledge Base
- Email, Messaging & Web
Having an @uidaho.edu and an @vandals.uidaho.edu is important for student employees at the University. It helps protect a students education-related data and keep University business separate to maintain official University records and comply with U of I policy (in APM 30.10).
- Knowledge Base
- Data Security & Records
This article explains the process used when identifying the risks associated with a particular product or service for the intended use.
- Knowledge Base
- Classroom Technology
- Knowledge Base
- Collaboration and Communication
- Cisco Phone Service (Legacy)
- Knowledge Base
- Email, Messaging & Web
- Knowledge Base
- File Storage