Securing and protecting IT resources and sensitive data at U-M is a shared responsibility. Laws and U-M policies help define this responsibility, which applies to university owned and managed computers, as well as to personally owned devices used to access sensitive university data.
The following guidelines include links to resources that are designed to help you meet your responsibility of protecting sensitive data.
Access Only the Data You are Authorized to Access
Don't request access unless you truly need it.
Remove access when no longer appropriate.
Work With Data Responsibly
Comply with laws, policies, and regulations when handling specific types of data.
Follow Information Security Risk Management guidelines to help protect sensitive data.
Take extra care when traveling.
Take extra care when working from home or away from campus.
If you use personal devices with sensitive data, you will have extra responsibilities.
Never use personal accounts to maintain or share the university's sensitive data.
Use cloud services responsibly
Store Data in the Appropriate Places
Learn where specific types of data can be safely stored.
If you are working with HIPAA data, ITS offers some HIPAA-aligned services.
Properly Manage Devices Used with Sensitive Data
Follow device security rules.
Securely dispose of media that has ever held, stored, or transmitted sensitive data.
Report a Breach or Compromise of Sensitive Data
Don't wait to gather evidence or resolve it yourself; report immediately if you suspect a breach.
Get Help from these U-M Offices If Needed
FOIA Office
General Counsel
Human Resource Records and Information Services
Michigan Medicine Compliance Office
Registrar
Research Information Security and Compliance
Treasurer's Office