Information Access & Protection Standard
The Information Access & Protection (IAP) Standard provides requirements for the proper handling of information at RIT.
The standard classifies information into four categories: Private, Confidential, Internal, and Public.
Private information is information that is confidential and which could be used for identity theft. Private information also has additional requirements associated with its protection (e.g., state and federal mandates). Examples include:
- Social Security Numbers (SSNs) or other national identification numbers
- Driver’s license numbers
- Financial account information (bank account numbers, checks, credit or debit card numbers), etc.
Confidential information is... ...
This section of the website contains links to tools and documentation specifically for use by administrators. Scroll to the bottom of the page to access these resources.
What are my responsibilities as an administrator?
You are responsible for ensuring that all web resources, computers, servers, network devices, and any other types of computing devices that you support comply with all published standards.
You are also responsible for prompt reporting of computer incidents to the ISO in accordance with the Computer Incident Handling Standard.
Computer Incident Handling Resources
- Report a Computer ... ...
End User Identity Finder Guide for Windows (updated May 5, 2011)
End User Identity Finder Guide for Mac (updated December 16, 2011)
Mac Quick Reference (updated February 14, 2012)
End User Identity Finder software demo (requires Adobe Flash)
RIT Information Security wiki
Administrator resources are available; login required. Restricted access.