Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

Establishes procedures and assigns responsibilities for detecting, reporting, and responding to suspected and known information security incidents that result in unauthorized access or alteration of University business records, or attempts to deny or impede legitimate access to those records.

Information Security Awareness Program

...