You are here

Storage and Cloud Computing Approved Usage

Effective Dates and Issuing Authority

Effective Date:   January 30, 2014
Date Last Reviewed:  January 30, 2014
Date Scheduled for Review:  January 30, 2015
Issuing Authority:   Chief Information Security Officer

Introduction

Classification Description Key
Confidential Inappropriate handling could result in severe consequences, such as criminal or civil penalties, identity theft, financial loss, or invasion of privacy.  Access is granted by supervisor/manager and Data Steward approval process based on job needs justification.  An annual access audit will be completed and the data must remain within Temple locations, on Temple assets or with contracted vendors that have been approved through the Office of University Counsel and Computer Services Office of Information Security. confidential "red" icon
Sensitive All data not defined as unrestricted or confidential.  This data may be accessed by anyone employed or working under contract for the University, in the conduct of bona fide University business. Access is granted by supervisor/manager and Data Steward approval process based on job needs justification.  However, because of legal, ethical, or other constraints access restrictions should be applied accordingly.
Unrestricted Information that is publicly available and generally the unauthorized disclosure, alteration or destruction of that data would result in little or no risk to the University and its affiliates. Examples of unrestricted data include press releases, course information, job descriptions and marketing materials intended for the general public.
  • Guiding principal is that a user must have an approved need (legally and/or for business purposes) to have access to data.
  • Researchers must check with their granting organization for data management plans and data classification requirements. 
  • All systems containing data classified as Sensitive or Confidential should be security administered by the Computer Services Security Administration Organization.

Guidelines

Use the following as guidelines. The list is not inclusive. 

Key Classification Approved Storage and Cloud Service
Confidential, Sensitive and Unrestricted Data
  • Temple University Storage (TUCloud/TUVault/Departmental Shares)
    -With encryption or on Temple HIPAA environment
  • Banner Document Management (Xtender)
    - Cannot be used to store Data Elements classified as Health Information.
  • TUsafesend.temple.edu (Secure Data Transport)
Sensitive and Unrestricted Data
  • Temple University Storage (TUCloud/TUVault/Departmental Shares)
  • TUsafesend.temple.edu (Secure Data Transport)
  • OWLbox (Temple’s Enterprise Managed Accounts)
  • GMAIL (Google Email)/University Exchange Mail (Using Encrypted Files e.g. PGP, winzip, 7zip)
  • Google Docs/Google Drive Mail (Using Encrypted Files e.g. PGP, winzip, 7zip)
Unrestricted Data
  • Temple University Storage (TUCloud/TUVault/Departmental Shares)
  • TUSafeSend.Temple.edu (Secure Data Transport)
  • BOX.COM
  • DROPBOX
  • EVERNOTE
  • GMAIL (Google Email)/University Exchange Mail
  • Google Docs/Google Drive
  • iCloud
  • OneDrive
  • SyncWorks
  • Workstation (Desktop, Laptop, Tablet)