Global Activities Registry Collection Security
Global Activities Registry Collection Access Prerequisites
Users gain access to Global Activities Registry data by
submitting the e-Form for the
DW Global Activities Registry. The form is routed for electronic signatures by the requestor's Supervisor,
the school access administrator
(or senior business officer), and the Office of International Programs.
Releasing Data Outside the University
Be cautious about releasing Global Activities Registry data outside the
University. If you receive a request for data to be sent outside the
University, contact the Office of International Programs.
Keep a Log
You might want to keep a log of the reports you create, even if you are
giving it to someone within the University. The log might include:
- Who requested the data.
- When they made the request.
- What data they requested.
- Why they requested the data/how they planned to use it.
- What query and/or report you used.
Releasing Data Within the University
Within the University, Global Activities Registry data may be disclosed
only if it
is needed to do the business of the University, and only to those who
need to know the information in order to do their jobs. If you are not
sure whether to fulfill a request for Global Activities Registry data,
call the Office
Questions you shoud ask to help decide whether to fulfill a request
for Global Activities Registry data:
Query Results.If you save your query results in Excel, pdf, or any other local file type, you must see to it that any sensitive data stored on your personal computer is safeguarded through physical security, access control software, or encryption.
- Examples of physical security are locked offices and locked keyboards.
- Examples of access control software are a screen saver with password
protection (which your computer has been set up to initiate at startup)
or specialized desktop security software.
- If you encrypt your query results, you will need to decrypt them before
accessing them with Business Objects.
When a computer is left signed to an account, it is easy for someone to
gain unauthorized access. Either sign off from your account before you
leave your computer or restrict access by some other means (physical security
or access control software).
For more information on security and privacy, contact the Office of Information Security.