News

The University at Buffalo Data Technology Office (UBIT)’s Information Security Program identifies and describes goals, expectations, roles, and responsibilities with respect to information security ...
From classification and encryption to employee training and compliance, a strong document security framework is now a legal, ...
Data Classification Policy This document defines the university's system and data classification scheme and established procedures for protecting critical IT systems and sensitive university data ...
Challenging resilience myths is also vital to protecting federal infrastructure. Despite perceived progress, adversaries’ ...
Such data breaches, especially in the public sector, can have serious consequences, from identity theft to endangering the lives and physical security of the individuals whose data is compromised.
The Security Camera Policy and these Security Camera Procedures (“Procedures”) also govern security camera data access, control, and retention. The Policy and these Procedures support the use of ...
TransUnion LLC is facing a proposed class action accusing the credit reporting company of failing to protect the personally identifiable information of more than 4 million people that was exposed in a ...
The EPA is currently following outdated IT evaluation procedures that give the agency three years to ensure its compliance with the federal mandates, while the Office of Management and Budget has ...
University of Utah Health (U of U Health) announced today that it began notifying patients of recent data security incidents that involved some U of U Health employees' email accounts. From January 22 ...