Employees
All new employees, students, and affiliates are required to assent to the Acceptable Use Agreement for Access to Technology and Information Resources as part of the process of obtaining their first IU computing accounts. The agreement tool also allows for verifying that an employee has assented to the Acceptable Use Agreement - Access to Technology and Information Resources - Employees.
Additionally, to gain access to certain information, data managers may require completion of training, such as the FERPA Tutorial. Further information on access to technology and information assets is found in Domain 8: Identity and Access Control.
The University Information Policy Office conducts regular university-wide, general awareness and training activities. An example of such an event is the annual International Data Privacy Day at IU, which began in 2008.
The Office of Research Administration, Research Ethics, Education and Policy provides resources to support the responsible conduct and administration of research at IU.
Policy IT-02: Misuse and Abuse of Information Technology Resources outlines the disciplinary process for security breaches and noncompliance with information and technology policy.
University Human Resource Services provides a Corrective Action Resource Page for supervisors, managers, and staff and hourly employees.
Affiliated/partner Organizations
Affiliated and partner organization users who are provided access to IU computing accounts are required to assent to the Acceptable Use Agreement for Access to Technology and Information Resources as part of the process of obtaining the IU computing accounts. The agreement tool also allows for verifying that an individual has assented to the Acceptable Use Agreement - Access to Technology and Information Resources - Employees.
If the affiliated or partner organization user will not be using IU computing accounts, but will be encountering IU data in the course of their duties - including test, development, and production data - document their understanding using an agreement such as the Data Security Agreement - Terms and Conditions for Access and Use of Indiana University Data (available in EPIC under the Department Resources tab).
Affiliated and partner organization users may be required to take additional training.
Additional safeguards for affiliating or partnering are outlined in the "External Parties" section of Domain 3: Organization.
Third Party Vendors
If the third party vendor will be encountering IU data in the course of their duties - including test, development, and production data - document their understanding using an agreement such as the Data Security Agreement - Terms and Conditions for Access and Use of Indiana University Data (available in EPIC under the Department Resources tab).
Third party vendor users may be required to take additional training.
Additional safeguards for affiliating or partnering are outlined in the "External Parties" section of Domain 3: Organization.