Sensitive Data (2024)

Everyone is responsible for a range of sensitive data, from your security number to bank account information to student grades and research findings.

Best practices

  • Store data on protected equipment, like OIT File Services
  • Never store sensitive data on laptops or mobile devices, includingUSB andexternal hard drives
  • Never send sensitive or personal information by email
  • Only keep as much sensitive data as you are obligated to keep

Store Data in a Safe Place

Network storage solutions, like OIT File Services, are a great way to protect your university-related sensitive information. OIT File Services can only be accessed by those with appropriate permission and is frequently backed up to prevent data loss.

Additionally, these solutions protect data from theft by storing them on secured equipment and not on devices that could be stolen. If you must store data on a local computer or device, be sure to use a strong password to protect the machine.

Should I save university-related sensitive data to cloud solutions, such as Google Drive, Dropbox, etc.?

Student and health-related data are subject to NSHE policies as well as state and federal law. We recommend OIT File Services for the storage of sensitive or protected university data. Please contact the IT Help Desk if you have questions about using other services to store sensitive data.

Should I save my personal sensitive data to cloud solutions, such as Google Drive, Dropbox, etc.?

Many services offer protection for sensitive data, but in general, cloud storage solutions may not provide encryption for your data as it sits in storage. It’s up to you to review these services and decide whether or not they suit your needs to protect your personal information.

Never send sensitive information by email

Emailing sensitive information puts that information out of your control, and in many cases of university data, violates state and federal laws that protect private information. If you must share sensitive or private information, consider secure means of transferring that information, such as the UNLV Secure File Transfer tool.

Remove unneeded data

Consider only storing absolutely necessary information. The more information that exists on a computer or on network storage, the more than can be stolen in the event of a data breach. If you no longer have a need for the data and have no legal obligation to retain it, delete it.

Related Policies

Sensitive Data (2024)
Top Articles
Perspective Coursework Guide | Tate
Why is 'MIS (Intraday) is blocked for this FINNIFTY contract' being displayed?
Warren Ohio Craigslist
Alan Miller Jewelers Oregon Ohio
From Algeria to Uzbekistan-These Are the Top Baby Names Around the World
Activities and Experiments to Explore Photosynthesis in the Classroom - Project Learning Tree
Bucks County Job Requisitions
Delectable Birthday Dyes
Craigslist Phoenix Cars By Owner Only
Does Publix Have Sephora Gift Cards
Cvb Location Code Lookup
Immortal Ink Waxahachie
Simplify: r^4+r^3-7r^2-r+6=0 Tiger Algebra Solver
Comics Valley In Hindi
Dumb Money, la recensione: Paul Dano e quel film biografico sul caso GameStop
Zalog Forum
Airrack hiring Associate Producer in Los Angeles, CA | LinkedIn
Teacup Yorkie For Sale Up To $400 In South Carolina
Juicy Deal D-Art
O'Reilly Auto Parts - Mathis, TX - Nextdoor
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
Craigslist Northfield Vt
Buying Cars from Craigslist: Tips for a Safe and Smart Purchase
Riversweeps Admin Login
Violent Night Showtimes Near Amc Dine-In Menlo Park 12
Manuela Qm Only
Tomb Of The Mask Unblocked Games World
Vivification Harry Potter
Earthy Fuel Crossword
What Is The Lineup For Nascar Race Today
Scat Ladyboy
Unm Hsc Zoom
Autopsy, Grave Rating, and Corpse Guide in Graveyard Keeper
Orange Pill 44 291
Iban's staff
Manatee County Recorder Of Deeds
When His Eyes Opened Chapter 2048
How are you feeling? Vocabulary & expressions to answer this common question!
Busch Gardens Wait Times
Letter of Credit: What It Is, Examples, and How One Is Used
Subdomain Finder
Florida Lottery Claim Appointment
boston furniture "patio" - craigslist
Juiced Banned Ad
Coffee County Tag Office Douglas Ga
Reilly Auto Parts Store Hours
Rite Aid | Employee Benefits | Login / Register | Benefits Account Manager
Shiftselect Carolinas
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Law Students
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 5859

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.