• Live Chat
  • Report an IT Security Incident
  • Request Help
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Bits & Bytes Archive
    • Spotlights
    • Bulletins
George Mason University
  • Live Chat
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • Live Chat
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Working/Learning Remotely
    • Computer Labs & Classrooms Information
  • Service Catalog
    • ITS General Help
    • Accounts & Access
    • Communications & Collaboration
    • Computers & Software
    • Information Security
    • Network & Internet Services
    • Professional Services
    • Research Computing
    • Teaching & Learning
    • University Applications
  • About ITS
    • Our ITS Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Architectural Standards Review Board
    • Banner Admin
    • Business Intelligence
    • Data Governance
    • Enterprise Data Integration Services (EDIS)
    • IT Business Analysis
    • IT Security Office
    • Projects & Project Management
    • Technical Business Solution Intake Request Process
  • Alerts & Outages
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • After Action Reports
    • Archives
    • ITS Alerts Sign Up
  • News
    • Bits & Bytes Signup
    • Bits & Bytes Submissions
    • Bits & Bytes Archive
    • Spotlights
    • Bulletins

How can ITS help you?

Our services are designed to help you succeed at Mason—
search our services, knowledge articles, how to guides, FAQs, and more.

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Highly Sensitive Data > Who are “Data Owners” and what are their responsibilities?

Who are “Data Owners” and what are their responsibilities?

Data Owners are the university’s authorities on how data can be used, stored, shared, and transported (identified in Appendix B of the Data Stewardship Policy). However, only a Chief Data Steward can give permission to store Highly Sensitive Data (HSD).

The Data Owner is the business lead for a department that governs a class of data:

  • The Registrar: for student data
  • The Associate Vice President of Human Resources: for faculty and staff HR data
  • The University Controller: for financial data (credit card numbers, etc.)
  • Deans of Schools or Colleges: for research data collected in their particular school or college (but NOT for Mason faculty, staff, student or financial data collected in their school or college)

The Data Owner may grant permission to access and/or share HSD (Note: Approval may have been previously granted through a Banner Security Liaison and/or Banner Security Officer; confirm with department head or Mason’s IT Security Office.)

The Data Owner oversees agreements in place between suppliers and receivers of sensitive data:

  • In agreements between the supplier of the sensitive data and the receiving department, the departmental authority of the supplier of the sensitive data is responsible for determining how the data can be used, stored, shared and transported, recognizing the preeminent authority of university policies governing data.
  • In agreements which are required between the authority in the department and those with whom data is shared, the departmental authority is responsible for determining how the data can be used, stored, shared and transported, recognizing the preeminent authority of university policies governing data.
Last modified: September 7, 2018

Previous

What is encryption “at rest?”

Next

How does someone begin the process of obtaining authorization to store Highly Sensitive Data?

Related articles

  • How do I secure my computer?
  • What university policy governs permission to access or store Highly Sensitive Data?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data be protected by encryption?
  • What are some examples of encryption “in transport?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

READ MORE

Quick Links

Patriot Pass Password Reset
Create a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

READ MORE

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

I T S Logo

© 2024 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Follow Us
location pin for in-person IT support   @GeorgeMasonITS
location pin for in-person IT support   @georgemasonits
ITS Support 24/7
   703-993-8870
   Live Chat
  • Webmaster