• Report an IT Security Incident
  • Request Help
  • Help & Support
    • COVID-19 Support
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Computers & Software
    • Email & Collaboration
    • Teaching & Learning
    • Network, Internet & Telephone
    • University Applications
    • Web, Servers & Data
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Solution Request
    • Governance Committees
    • Portfolio and Project Management Office
    • Architectural Standards Review Board
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives
    • Known Issues
  • Report an IT Security Incident
  • Request Help
X Hide

Information Technology Services

Skip to content
  • Help & Support
    • COVID-19 Support
    • Request Help
    • Track a Ticket
    • Knowledge Base
    • Getting Started
    • Contact Us
    • ITS Alerts Sign Up
  • Service Catalog
    • Accounts & Access
    • Computers & Software
    • Email & Collaboration
    • Teaching & Learning
    • Network, Internet & Telephone
    • University Applications
    • Web, Servers & Data
  • About ITS
    • Our Team
    • Strategic Plan
    • Annual Reports
    • Awards
    • Student Employment
  • Working with ITS
    • Solution Request
    • Governance Committees
    • Portfolio and Project Management Office
    • Architectural Standards Review Board
    • Business Intelligence
    • Enterprise Data Integration Services (EDIS)
    • GMU-TV
    • IT Security Office
  • Alerts & Bulletins
    • Unplanned Outages
    • Phishing Alerts
    • Maintenance
    • Bulletins
    • Spotlights
    • After Action Reports
    • Archives
    • Known Issues

Knowledge Base

Home > Help & Support > Knowledge Base > Security > Highly Sensitive Data FAQ > Who are “Data Owners” and what are their responsibilities?

Who are “Data Owners” and what are their responsibilities?

Data Owners are the university’s authorities on how data can be used, stored, shared, and transported (identified in Appendix B of the Data Stewardship Policy). However, only a Chief Data Steward can give permission to store Highly Sensitive Data (HSD).

The Data Owner is the business lead for a department that governs a class of data:

  • The Registrar: for student data
  • The Associate Vice President of Human Resources: for faculty and staff HR data
  • The University Controller: for financial data (credit card numbers, etc.)
  • Deans of Schools or Colleges: for research data collected in their particular school or college (but NOT for Mason faculty, staff, student or financial data collected in their school or college)

The Data Owner may grant permission to access and/or share HSD (Note: Approval may have been previously granted through a Banner Security Liaison and/or Banner Security Officer; confirm with department head or Mason’s IT Security Office.)

The Data Owner oversees agreements in place between suppliers and receivers of sensitive data:

  • In agreements between the supplier of the sensitive data and the receiving department, the departmental authority of the supplier of the sensitive data is responsible for determining how the data can be used, stored, shared and transported, recognizing the preeminent authority of university policies governing data.
  • In agreements which are required between the authority in the department and those with whom data is shared, the departmental authority is responsible for determining how the data can be used, stored, shared and transported, recognizing the preeminent authority of university policies governing data.
Last modified: September 7, 2018

Previous

How does someone begin the process of obtaining authorization to store Highly Sensitive Data (HSD)?

Next

What is encryption “at rest?

Related articles

  • How do I secure my computer?
  • What university policy governs permission to access or store Highly Sensitive Data (HSD)?
  • What type of data might appear highly sensitive, but is not subject to the Data Stewardship policy?
  • When must Highly Sensitive Data (HSD) be protected by encryption?
  • What are some examples of encryption “in transport?"

Get Started at Mason

Whether you are a student, faculty, staff member, or a guest visiting the Mason campus, we have resources to help get you started.

Read More

Quick Links

Patriot Pass Password Reset
Submit a Ticket
Track a Ticket
PuTTY
Cisco AnyConnect VPN

Read More

Explore IT Services

A B C D E F G
H I J K L M N
O P Q R S T U
V W X Y Z #

© 2020 George Mason University
4400 University Drive
Fairfax, Virginia 22030

Latest tweet

George Mason ITSFollow

George Mason ITS
George Mason ITS@GeorgeMasonITS·
9 Apr

Watch out for phishing #MasonNation! 👀

https://its.gmu.edu/bulletins/phishing-alert-beware-of-phony-job-offer/

Reply on Twitter 1380516501191540737Retweet on Twitter 1380516501191540737Like on Twitter 13805165011915407371
View All
ITS Support Center
703-993-8870
support@gmu.edu
Monday–Thursday,
8 a.m.–9 p.m.
Friday, 8 a.m.–5 p.m.
Saturday, Closed
Sunday, 1 p.m.–9 p.m.
(closed Thursday 3 p.m.–4 p.m. for a team meeting)
  • Webmaster
X
An invitation to participate in the annual IT Faculty Services Survey has been delivered to instructional and adjunct faculty via an email from CIO/VPIT, Kevin Borek. See the email for details. Your participation is appreciated.