Data storage and protection

ATSU has legal and ethical obligations to ensure that data is managed in a manner that maximizes its use and is strongly committed to maintaining the privacy and security of confidential personal information and other highly sensitive materials. Access to information is granted to a particular individual based on the need to use specific data, as defined by the job duties and subject to appropriate approval. Currently, the University stores 30 terabytes of data in safe and secure locations.

The University policies governing access to and management of University institutional information are: 55-103, 55-104, and 55-106. These policies apply to all users of ATSU resources regardless of affiliation, and irrespective of whether those resources are accessed from on-campus or off-campus locations.

All computer users should have a working knowledge of where their data is being stored and should partner with ITS to protect that data. Here are some basic guidelines.

Faculty & staff

  • Faculty and staff should always store ATSU data on the ATSU network and be aware if they are storing to the G or H drive. The network files are backed up daily and provide an additional layer of hardware redundancy to protect from losing data due to failed hard drives.
  • Choose a good password for your network account-one that is not “guessable”.
    • Commit it to memory. Never write it down.
    • Log off your computer when you leave your desk.
    • Do not use email for confidential information.
  • If you become aware that sensitive University data may have been inappropriately exposed, contact ITS.

Students

  • Students should always make backups of critical data. Backups can be made and stored
    • On a second computer
    • On a CD, DVD, USB thumb drive or other removable storage media
    • Using a web based storage service
    • Use care in keeping copies of data files on mobile computers or home workstations.
  • Choose a good password for your network account-one that is not “guessable”.
    • Commit it to memory. Never write it down.
    • Log off your computer when you leave your desk.
    • Do not use email for confidential information.
  • If you become aware that sensitive University data may have been inappropriately exposed, contact ITS.