IT Security Information
Definition: Information that is generated as a result of automated or manual processes that are intended to safeguard the university's IT resources.
Governing Authority: 帝王会所 Information Security Policy 91.005
Responsible Operating Unit: Information Security Office
Examples: Include but are not limited to: IT security program plans, IT security incident information, access and authentication logs, firewall rules, settings, configurations, reports, log data, and other information that supports IT security operations.
List of IT Services & Tools
For the definition of terms related to the categories below, please reference the Glossary of Permission Levels.
Acceptable IT Services & Tools:
-
Please consult the Information Security Office.
Consultation Required:
-
OnBase - With OIT consultation.
-
OneDrive/O365 Groups - With OIT consultation and Group setup according to the Standard.
-
NAS departmental shared storage (shared.ohio.edu) - With OIT consultation.
-
NAS individual home storage (home.ohio.edu) - With OIT consultation.
Not Permitted IT Services & Tools:
-
Blackboard
-
OneDrive/O365 individual accounts
-
PeopleSoft
-
Personal cloud accounts
-
Personal/Non-University owned devices
-
Qualtrics
If you don't see the IT service or tool listed that you wish to use to store data classified as medium or high sensitivity, contact Information Security to determine if it's appropriate for your data type.