While working with your research data, be aware of the following UConn policies that may apply to your work or how the data is stored and handled.
The content on this page is informational only. Please contact UConn ITS for specific questions or concerns related to your IT resources.
Confidential Data requires the highest level of privacy and may not be released.
Confidential Data is data that is protected by either:
See the extended list of Confidential Data for common types of confidential data.
Protected Data must be appropriately protected to ensure a lawful or controlled release (e.g. Connecticut Freedom of Information Act requests). This is all data that is neither Confidential or Public data (e.g., employee email).
Public Data is open to all users, with no security measures necessary. Data is public if:
Per the Export Control and Economic Sanctions Policy, "Export control and economic sanctions regulations aim to protect the national security, foreign policy, and economic interests of the United States. Export control regulations govern how certain information, technologies, and commodities can be transmitted overseas or to a foreign national on U.S. soil, whereas economic sanctions regulations restrict transactions with certain countries, institutions, and individuals. The scope of the these regulations is broad: they cover exports in virtually all fields of science, engineering, and technology, apply to research activities regardless of the source of funding, and impose restrictions on activities by U.S. persons that occur outside the United States."
The encryption guidelines noted below in the Mobile and Remote Device Policy discuss encryption tools, and the IT link below details security tools and options available at UConn.
Per the Employee Code of Conduct:
"University of Connecticut faculty, staff, student employees, and volunteers who use mobile or remote devices are responsible for any institutional data that is stored, processed, and/or transmitted via a mobile or remote device and for following the security requirements set forth in this policy."
Please see the full policy, linked below, for details on the types of security requirements for these devices.
Additionally, there are guidelines regarding storage of confidential data on mobile devices:
"In general, confidential data should not be stored on mobile devices, including laptops. However, in certain instances and depending on job responsibilities, this may be unavoidable. In these instances, confidential data must be stored on university-owned devices ONLY with the following requirements:
This work is licensed under a Creative Commons Attribution NonCommercial 4.0 International License.
| Details and Exceptions