This procedure is to assure that, in case of an information security incident that threatens the availability, confidentiality, and integrity of University information assets, information systems, and ...
Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...
The purpose of this document is to provide a step-by-step solution for Michigan Tech’s media destruction process. IT will provide the appropriate actions required to properly dispose of magnetic data ...
The Colorado Immunization Information System (CIIS) is a confidential, population-based, computerized system that collects and consolidates vaccination data for Coloradans of all ages from a variety ...
The University of Texas at San Antonio (UTSA) maintains hardware and software assets that are part of a comprehensive management process minimizing disruptions, optimizing costs, stewarding assets, ...