Impact on Other Systems and Activities
- Does the threat detection and identification system impact research bandwidth?
- Does the use of the threat detection and identification system conflict with the University’s regulatory or contractual obligations?
Does the threat detection and identification system impact research bandwidth?
No.
Does the use of the threat detection and identification system conflict with the University’s regulatory or contractual obligations?
No. To the contrary, the University is obligated under various federal and state laws and regulations to protect the security of private information; and under contracts with research sponsors and others to protect confidential information against unauthorized access. The University has determined that coordinated systemwide threat detection and identification is critical to efficiently and effectively addressing those obligations.
Threat detection and identification is among the security controls broadly recognized by security standards bodies and regulators as essential to protecting electronic systems against unauthorized access. See, for example: California Attorney General, 2016 California Data Breach Report (Appendix B); U.S. Department of Education, Data Security Checklist (pdf).