![]() See the OP 44 series of operating policies for more information. Method used to reduce the probability of occurrence or the negative impact of the realization of a risk.Ĭustodians ensure the effective and secure operation of the information owner’s systems. The controlling factor for confidential information is dissemination. Information maintained by the university that is exempt from disclosure under the provisions of the Public Records Act or other applicable state and federal laws. The classification of data of which unauthorized disclosure/use could cause serious damage to an organization or individual.Ĭharacteristic of information indicating it is intended to be known by a limited set of people. The process of controlling modifications to hardware, software, firmware, and documentation to ensure that information systems are protected against improper modification before, during, and after system implementation. Storage on a central server made available over a network to users.Īny implementation of new functionality, interruption of service, repair of existing functionality, and/or removal of existing functionality to an information system. University information that is generally publicly available. For a full definition see the Data Classification Standard. For a full definition see the Data Classification Standard. University information usually restricted to university employees, but which are releasable in accordance with the Texas Public Information Act. Information whose confidentiality is protected by law or contract, but for which there are no specifically proscribed penalties. Information whose confidentiality is protected by law or contract. The documentation of a predetermined set of instructions or procedures that describe how an organization’s critical business functions will be sustained during and after a significant disruption. Using biometrics to verify or authenticate the identity of a person. Methods for differentiating humans based upon one or more intrinsic physical or behavioral traits such as fingerprints or facial geometry. The requirement that an asset or resource be accessible to authorized persons, entities, or devices.Ĭopy of files and applications made to avoid loss of data and facilitate recovery in the event of a system failure. ![]() Even when identity and authentication have indicated who someone is, authorization may be needed to establish what actions are permitted. The act of granting permission for someone or something to conduct an act.
0 Comments
Leave a Reply. |