Data Security
Data Security (From the Office of Information Technology)
In general, data that is considered of low and intermediate sensitivity can be secured by investigators with minimal training. Plans to acquire data that is considered of high or very high sensitivity must be developed in collaboration with the college IT Director or designee.
2/27/2025
Examples of data with different levels of sensitivity and appropriate security controls
Level | Sensitivity of Data | Examples | Security Controls |
---|---|---|---|
0 | Low - Public | De-identified or anonymized data | Password-protected documents and files. Locked file cabinets and offices |
1 | Intermediate - Protected | Identifiable data (surveys, field notes), which, if disclosed, would NOT put subjects at great risk. | Encrypted files and flash drives |
2 | High - Restricted | Extremely sensitive data such as medical records with identifiers (HIPAA regulated) and student records with identifiers (FERPA regulated) | Same as Level 1 but verified by college IT Director or designee; encrypted laptops or workstations. Please contact your local IT for assistance or submit a ticket here. |
3 | Very High - Highly Restricted | Research records with identifiers of self-disclosed criminal activity or mental health issues. | Same as Level 2 with additional precautions as determined by college IT Director or designee. Please contact your local IT for assistance or submit a ticket here. Also consider a Certificate of Confidentiality, if appropriate. |
College IT directors (Key technical resources)
- Ben Andera - Executive Director Academic and Research Computing
- Jerry Todd - Chief Information Security Officer
- Kurt Smith - Assistant Dean Healthcare - IT
- Tim Gramza - Director of IT - CLASS and CBA
- Mel Taylor - Director of IT - CSE
- Mike Reuter - Director of IT - CEHS and CAM
How to encrypt flash/thumb drives
Use the link below to find more information about protecting data on flash/thumb drives.
Removable media and USB flash drives
IT Knowledge Base Information
Use the link below to visit the OIT Knowledge Base for more information about data security.