All institutional data must be assigned one of four data
classification levels based on compliance, privacy, sensitivity,
operational usage, and risk. Institutional data must be protected with
security controls and access authorization mechanisms identifi...
ENHANCED ENDPOINT PROTECTION SERVICE
With the increase in remote work for many employees, the need for
remote visibility and early detection of malicious activity is greater
than ever. That is why the university is complementing our existing
security too...
The Ohio State University Information Security Standard was developed
to provide a definitive set of risk management objectives and security
controls for all university information systems and assets under the
university's control and for the people who a...
Everyone at Ohio State handles data. Whether it's their personal
information, someone else's or valued research, we're often balancing
our need for security with our desire to preserve the open,
information-sharing mission of our academic culture.
The I...
The purpose of this policy is to protect the university's
institutional data while preserving the open, information-sharing
mission of its academic culture. The university classifies
institutional data in accordance with legal, regulatory,
administrative,...
The Institutional Data Usage and Confidentiality Agreement applies to:
faculty, staff, students, contractors, volunteers, visitors, sponsored
guests of academic and administrative units, and affiliated entities
who have access to institutional data.
The...
To identify which classifications of institutional data are permitted
for specific data user activities, review the Permitted Data Usage by
Activity document at osuidp-useractivities_201209.pdf
[https://cybersecurity.osu.edu/system/files/osuidp-useractivi...
To identify which classifications of institutional data are permitted
for specific core or hosted services, review the IDP Calculator at:
osuidp-coreservices_210503.pdf
[https://cybersecurity.osu.edu/system/files/osuidp-coreservices_210503.pdf]