Security

Digital Security: Email, Phishing Attempts, Malicious Software, and Computer Viruses

Protect your digital information by recognizing attempts to compromise it. Urban can be a target, as can some of our high-profile researchers or projects. People often try to gain entry into our systems, and yo...

Physical Security: Access to Workspaces and Equipment

If you’re new here and do not know many of your fellow workers, do not hold the door open for strangers: people claiming to need to make a delivery, forgot their keycard, etc. If someone needs access to your sp...

Data Storage

This is how store different types of data using the various methods we have available to us at UI. Those methods include Box, the K drive, the Y drive, email, SFTP, SharePoint, and via a parner's SFTP site. ...

On the Destruction of Data

On the Destruction of Data As of: 9-15-2016 Robert Broughman Projects dealing with confidential data - Personally Identifiable Information, Personal Health Information, credit card; normally contain a clause ...

Requesting Remote Access to Confidential Data

The process of obtaining an exception to the to the Electronic Communications Policy to allow remote access to confidential data begins with completion of the Memorandum on Remote Access to Confidential Data te...

How to use 8x8 for recording phone interviews.

The 8x8 system is compliant with HIPAA, PCI-DSS 3.1,FISMA/FIPS 140-2 and Safe Harbor regulations so researchers can collect PII on the 8x8 system. Researchers should save the recordings to an encrypted drive an...