Protect Sensitive Data

Securing and protecting IT resources and sensitive data at U-M is a shared responsibility. Laws and U-M policies help define this responsibility, which applies to university owned and managed computers, as well as to personally owned devices used to access sensitive university data.

The following guidelines include links to resources that are designed to help you meet your responsibility of protecting sensitive data.

Access Only the Data You are Authorized to Access

Don't request access unless you truly need it.

Remove access when no longer appropriate.

Work With Data Responsibly

Comply with laws, policies, and regulations when handling specific types of data.

Follow Information Security Risk Management guidelines to help protect sensitive data.

Take extra care when traveling.

Take extra care when working from home or away from campus.

If you use personal devices with sensitive data, you will have extra responsibilities.

Never use personal accounts to maintain or share the university's sensitive data.

Use cloud services responsibly

Store Data in the Appropriate Places

Learn where specific types of data can be safely stored.

If you are working with HIPAA data, ITS offers some HIPAA-aligned services.

Properly Manage Devices Used with Sensitive Data

Follow device security rules.

Securely dispose of media that has ever held, stored, or transmitted sensitive data.

Report a Breach or Compromise of Sensitive Data

Don't wait to gather evidence or resolve it yourself; report immediately if you suspect a breach.

Get Help from these U-M Offices If Needed

FOIA Office

General Counsel

Human Resource Records and Information Services

Michigan Medicine Compliance Office

Registrar

Research Information Security and Compliance

Treasurer's Office

ClosePreviousNext