The Data Access Policy defines the roles, responsibilities, data management environment, and procedures for granting access to UB’ non-public data. The University at Buffalo (UB, university) is ...
In my many years as an IT trainer I have always emphasized the importance of "plumbing technologies" that fade into the background so that no-one thinks about them until they break. Examples include ...
The purpose of this policy is to define required access control measures to all University systems and applications to protect the privacy, security, and confidentiality of University information ...
The University at Buffalo Information Technology (UBIT) operates as a covered entity as defined by the U.S. Department of Health and Human Services Office of Civil Rights. HIPAA Regulation Text 45 CFR ...
The purpose of this policy is to define standards for connecting to Connecticut College's network from any end user device, for example: PC, Tablet). These standards are designed to minimize the ...
Microsoft this month gave renewed notice that it is soon plans to activate Microsoft Entra ID Conditional Access policies that it set in November for certain Microsoft 365 licensees. The policy ...
This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets. Read now Hacking, data ...
This is a section within Good practices for university open-access policies. In this guide, we present our understanding of good practices for university open-access policies. An effective OA policy ...
To support LSE researchers meet the requirements of their funders, to broaden the School’s audiences and impact, and to allow authors the freedom to choose the most appropriate place to publish, LSE ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results