Access to TDI System Data
- Who has access to the threat detection and identification system?
- Is the stored metadata disclosed to local administrative officials, e.g., Chancellors, Deans, or Department Chairs?
Who has access to the threat detection and identification system?
Only assigned and authorized personnel have access to the threat detection and identification (TDI) system. This is limited to information technology security teams (these are staff already entrusted with handling privacy and security.) At the vendor, this is limited to personnel specifically assigned to the UC account.
Three key factors protect against misuse:
- Access to the system is only granted to analysts who have a specific job responsibility requiring access.
- The TDI system logs all analyst actions in a detailed audit log.
- UC analyst, location analyst, and vendor training specifically focuses on protecting privacy and following the ECP.
Is the stored metadata disclosed to local administrative officials, e.g., Chancellors, Deans, or Department Chairs?
No.