OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Transmission of Sensitive Data:

Supporting documents: Full policy Adobe PDF File

Data and Resource Owners must appropriately protect Sensitive Data from unauthorized interception, modification, or access during electronic transmission.

Data and Resource Owners must establish controls to safeguard the confidentiality and integrity of Sensitive Data during transmission over an electronic communications network. Encryption must be used when required by law, regulatory requirement, University mandate, or when determined necessary by the data and resource owners.

Encryption mechanisms must meet established industry and government standards.  See Encryption Standards (FIPS).