Report an IT Security Incident
Request Help
Help & Support
Request Help
Live Chat
Track a Ticket
Knowledge Base
Getting Started
Working/Learning Remotely
Contact Us
Service Catalog
Accounts & Access
Communications & Collaboration
Computers & Software
Data, Reporting & Analytics
Network & Internet Services
Professional Services
Research Computing
Teaching & Learning
University Applications
Web, Servers & Hosting
About ITS
Our Team
Strategic Plan
Annual Reports
Awards
Student Employment
Working with ITS
Architectural Standards Review Board
Business Intelligence
Data Governance
Enterprise Data Integration Services (EDIS)
GMU-TV
IT Business Analysis
IT Security Office
Projects & Project Management
Technical Business Solution Intake Request Process
Alerts & Bulletins
2023-2024 Technology Updates
Unplanned Outages
Phishing Alerts
Maintenance
Bulletins
Spotlights
After Action Reports
Archives
ITS Alerts Sign Up
George Mason University
Report an IT Security Incident
Request Help
X Hide
Skip to content
Help & Support
Request Help
Live Chat
Track a Ticket
Knowledge Base
Getting Started
Working/Learning Remotely
Contact Us
Service Catalog
Accounts & Access
Communications & Collaboration
Computers & Software
Data, Reporting & Analytics
Network & Internet Services
Professional Services
Research Computing
Teaching & Learning
University Applications
Web, Servers & Hosting
About ITS
Our Team
Strategic Plan
Annual Reports
Awards
Student Employment
Working with ITS
Architectural Standards Review Board
Business Intelligence
Data Governance
Enterprise Data Integration Services (EDIS)
GMU-TV
IT Business Analysis
IT Security Office
Projects & Project Management
Technical Business Solution Intake Request Process
Alerts & Bulletins
2023-2024 Technology Updates
Unplanned Outages
Phishing Alerts
Maintenance
Bulletins
Spotlights
After Action Reports
Archives
ITS Alerts Sign Up
Knowledge Base Category:
Highly Sensitive Data
Home
>
Help & Support
>
Knowledge Base
>
Security
>
Highly Sensitive Data
Articles
Data Classification and Storage Requirements
Who can work with Highly Sensitive Data?
What are sensitive systems?
What is Highly Sensitive Data?
What is Controlled Unclassified Information (CUI)?
What are the user’s responsibilities in protecting Highly Sensitive Data on the system?
How does someone begin the process of obtaining authorization to store Highly Sensitive Data?
Who are “Data Owners” and what are their responsibilities?
What is encryption “at rest?”
What are some examples of encryption “in transport?”
When must Highly Sensitive Data be protected by encryption?
What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
What university policy governs permission to access or store Highly Sensitive Data?
How do I secure my computer?