Report an IT Security Incident
Request Help
Help & Support
Working/Learning Remotely
Request Help
Live Chat
Track a Ticket
Knowledge Base
Getting Started
Contact Us
ITS Alerts Sign Up
Service Catalog
Accounts & Access
Communications & Collaboration
Computers & Software
Data, Reporting & Analytics
Network & Internet Services
Professional Services
Research Computing
Teaching & Learning
University Applications
Web, Servers & Hosting
About ITS
Our Team
Strategic Plan
Annual Reports
Awards
Student Employment
Working with ITS
Technical Business Solution Intake Request Process
Architectural Standards Review Board
Projects & Project Management
Technology Investment Request Lifecycle
Business Intelligence
Enterprise Data Integration Services (EDIS)
GMU-TV
IT Security Office
Alerts & Bulletins
2023-2024 Technology Updates
Unplanned Outages
Phishing Alerts
Maintenance
Bulletins
Spotlights
After Action Reports
Archives
George Mason University
Report an IT Security Incident
Request Help
X Hide
Skip to content
Help & Support
Working/Learning Remotely
Request Help
Live Chat
Track a Ticket
Knowledge Base
Getting Started
Contact Us
ITS Alerts Sign Up
Service Catalog
Accounts & Access
Communications & Collaboration
Computers & Software
Data, Reporting & Analytics
Network & Internet Services
Professional Services
Research Computing
Teaching & Learning
University Applications
Web, Servers & Hosting
About ITS
Our Team
Strategic Plan
Annual Reports
Awards
Student Employment
Working with ITS
Technical Business Solution Intake Request Process
Architectural Standards Review Board
Projects & Project Management
Technology Investment Request Lifecycle
Business Intelligence
Enterprise Data Integration Services (EDIS)
GMU-TV
IT Security Office
Alerts & Bulletins
2023-2024 Technology Updates
Unplanned Outages
Phishing Alerts
Maintenance
Bulletins
Spotlights
After Action Reports
Archives
Knowledge Base Category:
Highly Sensitive Data FAQ
Home
>
Help & Support
>
Knowledge Base
>
Security
>
Highly Sensitive Data FAQ
Articles
Who can work with Highly Sensitive Data?
What are sensitive systems?
What is Highly Sensitive Data?
What is Controlled Unclassified Information (CUI)?
What are the user’s responsibilities in protecting Highly Sensitive Data on the system?
How does someone begin the process of obtaining authorization to store Highly Sensitive Data?
Who are “Data Owners” and what are their responsibilities?
What is encryption “at rest?”
What are some examples of encryption “in transport?”
When must Highly Sensitive Data be protected by encryption?
What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
What university policy governs permission to access or store Highly Sensitive Data?
How do I secure my computer?