Erase them and/or delete U-M data when transferring or disposing of them.For guidance, see Your Responsibilities for Protecting Sensitive Data When Using Your Own Devices. Secure them in compliance with Security of Personally Owned Devices That Access or Maintain Sensitive Institutional Data (SPG 601.33).If you use your personally owned devices to access or work with sensitive U-M data, you are expected to Vulnerable data that might be stolen from a device could include your bank or investment account number and password, your credit card numbers, information in databases, spreadsheets, tax software, and data from research projects. Before disposing of any device or media, you should take steps to make sure you have removed all personal and other sensitive data from it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |