OUHSC Information Technology Department |
Transmission of Sensitive Data: Supporting documents: Full policy Data and Resource Owners must appropriately protect Sensitive Data from unauthorized interception, modification, or access during electronic transmission. Data and Resource Owners must establish controls to safeguard the confidentiality and integrity of Sensitive Data during transmission over an electronic communications network. Encryption must be used when required by law, regulatory requirement, University mandate, or when determined necessary by the data and resource owners. Encryption mechanisms must meet established industry and government standards. See Encryption Standards (FIPS). |
|
Copyright © 2006 The Board of Regents of the University of Oklahoma, All Rights Reserved.- Disclaimer | Copyright |