italygogl.blogg.se

Request a software gwu
Request a software gwu






request a software gwu

Regulated data in physical form (paper, media) should be secured (locked) at all times andĪccess should be restricted only to authorized users, with a legitimate business Regulated information may be stored only on GW IT hosted or approved servers or services (such as file sharing or collaboration services, cloud- based services, cloud-based back-up and recovery services, etc.)ĭocuments containing regulated data may be stored in the following GW systems:

  • Use of VPN (Use the GW VPN when working remotely and accessing restricted data.).
  • Requirements for accessing restricted information from personally owned workstations or mobile devices are:

    request a software gwu

    GW Storage systems approved for restricted information may be accessed but not installed. Restricted information may not be downloaded, stored or synchronized on personally owned workstations or mobile devices.

    Request a software gwu driver#

  • Firmware and driver updates should be installed within a reasonable period.
  • Updates for all installed software should be installed within a reasonable period.
  • Anti-Virus / Anti-Spyware software must be active and maintained up to date.
  • Use of VPN (Use the GW VPN when working remotely and accessing regulated data.).
  • Requirements for accessing regulated Information from personally owned workstations or mobile devices are:

    request a software gwu

    GW Storage systems approved for regulated information may be accessed but not installed. Regulated information may not be downloaded, stored or synchronized on personally owned workstations or mobile devices. Restricted data may be be accessed and processed using GW owned or approved workstations or mobile devices (such devices are configured and managed by the university and must be encrypted).

  • Registered and managed by the GW IT mobile device management service.
  • request a software gwu

    The following security controls must be in place: Regulated data may be accessed and processed using GW owned or approved workstations or mobile devices (such devices are configured and managed by the university and must be encrypted). It’s always preferable to use the strongest cipher available when transmitting Regulated Information, especially when transmitting to a third party. Data Protection RequirementsĪll network traffic must be encrypted in transit using at least TLS v1.1.(TLS v1.2 is strongly encouraged). These contracts contain the required terms and conditions to protect the university data and the tools, systems and technologies have been configured with appropriate security and privacy protections.Ĭontact the Privacy Office and/or GW IT ( or 20) for further instructions.įollow this Data Protection Guide to appropriately access, store, transmit or dispose of university data. When collecting, storing, sharing or disposing of university data, Faculty and Staff should only use systems, tools and technologies that have university approved contracts. Throughout its lifecycle, all university data stored, processed or transmitted at the university must be protected in a manner that is consistent with contractual or legal restrictions and is reasonable and appropriate for its classification.








    Request a software gwu