Eastern Michigan University

I.T. Security Information

I.T. sensitive information is about or related to I.T. operations, programs, systems, infrastructure, configurations, or investigations.

Examples
  • Information used in investigations but that we do not normally use, or is time sensitive, or expires such as legal discovery or FOIA compliance
  • Information gathered for security investigations
  • Internal matters such as personnel conduct and discipline matters
  • Sensitive information about I.T. operations, programs, server configurations, and administrator passwords

  Laws/Regulations/Policies

The data I.T. deals with can be affected by FERPA, HIPAA, GLBA, FISMA, Homeland Security regulations, copyright, criminal laws such prohibitions against sexual exploitation of minors, security, confidentiality, and privacy policies of the university and the Division of I.T.

 Additional Resources

I.T. Security: http://www.emich.edu/it/security/software/

 Using I.T. Security Information

The permitted (Yes), the not permitted (No), and those needing to contact I.T. (Contact I.T.) are listed in three columns in the matrix below.

                YES                  NO                
       CONTACT I.T.        
 
Note: Don't see what you need? Email the I.T. Security Team at it-security@emich.edu.