results for "security"
Results 1-10 of 37
Results Per Page: 
Security of Data Policy Statement In accordance with PS-124 Data Management , it is essential that confidential and/or private data be protected. It is very important to understand that confidential and/or private data could exist on your computer hard drive. When there is a loss of data through a security breach, a social engineering attack, or a hardware failure, there is a...
Article Id: 8037


Networking Resources: Use Of Computing Resources This is LSU's General Policy for Computer Users' Responsibilities. GENERAL POLICY Use of the University’s computing resources and network capacity is a privilege, not a right. LSU may limit access to and/or review and monitor its computing resources and the use of computing resources, without notice to or authorization from the...
Article Id: 7102

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs because the placement of data blocks is not as predictable as...
Article Id: 16716

General Information The Office of Finance and Administrative Services is responsible for the implementation of PS-113 (Social Security Policy) with respect to personnel and payroll records. Here are some of the current Frequently Asked Questions. Frequently Asked Questions When appointing student assistants do the departments need to keep copies of the I-9 forms, tax...
Article Id: 13485

Legislation and Confidentiality of Records The Family Educational Rights and Privacy Act (FERPA) The F amily E ducational R ights and P rivacy A ct of 1974, also known as the Buckley Amendment, is a federal law that protects the privacy of student “education records.” “Education records” are defined, with a few exceptions, as records containing information directly related...
Article Id: 6644

Linux IAAS SLA Introduction This document is to establish the Service Level Agreement for LSU’s Linux-based IAAS (Infrastructure as a Service). Service Availability ITS does not currently guarantee a service availability target but strives to maintain 99.9% availability, excluding pre-established monthly maintenance windows and down time caused by...
Article Id: 17667

Who reviews/approves the IT100 and why? The IT100 is reviewed by three different groups: Data Governance, ITS Security, and the Digital Resource and Content Committee (DRC). These groups analyze the potential data involved, security risks related to use of the software, and compliance with accessibility standards. Is IT100 approval required for purchases made by LaCarte card? ...
Article Id: 20507

The Optional Settings of the article allows detailed specifications on the SECURITY of the article and ARCHIVE settings (archived or not archived). For the most part, you will submit articles that are intended for public viewing. If there is a reason why the article is not public; please put this in the Article Notes detailing WHY the article needs to be "private" and WHO the person is...
Article Id: 6362

Provide Search Feedback Logo
Search Google Logo