results for "security"
Results 1-10 of 29
Results Per Page: 
Security of Data Policy Statement In accordance with PS-124 Data Management , it is essential that confidential and/or private data be protected. It is very important to understand that confidential and/or private data could exist on your computer hard drive. When there is a loss of data through a security breach, a social engineering attack, or a hardware failure, there is a...
Article Id: 8037



General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs because the placement of data blocks is not as predictable as...
Article Id: 16716

General Information The Office of Finance and Administrative Services is responsible for the implementation of PS-113 (Social Security Policy) with respect to personnel and payroll records. Here are some of the current Frequently Asked Questions. Frequently Asked Questions When appointing student assistants do the departments need to keep copies of the I-9 forms, tax...
Article Id: 13485

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

Legislation and Confidentiality of Records The Family Educational Rights and Privacy Act (FERPA) The F amily E ducational R ights and P rivacy A ct of 1974, also known as the Buckley Amendment, is a federal law that protects the privacy of student “education records.” “Education records” are defined, with a few exceptions, as records containing information directly related...
Article Id: 6644

Linux IAAS SLA Introduction This document is to establish the Service Level Agreement for LSU’s Linux-based IAAS (Infrastructure as a Service). Service Availability ITS does not currently guarantee a service availability target but strives to maintain 99.9% availability, excluding pre-established monthly maintenance windows and down time caused by...
Article Id: 17667

Who reviews/approves the IT100 and why? The IT100 is reviewed by three different groups: Data Governance, ITS Security, and the Digital Resource and Content Committee (DRC). These groups analyze the potential data involved, security risks related to use of the software, and compliance with accessibility standards. Is IT100 approval required for purchases made by LaCarte card? ...
Article Id: 20507

As part of ongoing modernization efforts with Single Sign-On (SSO) and Identity Access Management (IAM), LSU’s K2/BPM application offerings are being methodically migrated on an application-by-application basis to leverage an upgraded SSO process (much like Microsoft Teams and LSU E-mail are currently). Some common K2/BPM applications in use at LSU that will be affected include: Workday...
Article Id: 20630

Provide Search Feedback Logo
Search Google Logo