Skip to main content
Skip to main site menu
University Information Security Office
Search
Menu
Search this site
Close the search box
×
Search
Requests for UIS Services
Security Standards
Toggle sub-navigation
Close this sub-navigation
Security Standards for Georgetown Technology
Risk Classifications for Georgetown Assets and Data
Toggle sub-navigation
Minimum Security
Toggle sub-navigation
Security Considerations for Cloud Services
Toggle sub-navigation
Technology Policies
Toggle sub-navigation
Close this sub-navigation
100. University Security
Toggle sub-navigation
200. Information Systems Security
Toggle sub-navigation
300. Identity & Access Security
Toggle sub-navigation
400. Data Security
Toggle sub-navigation
500. 3rd-Party Security
Toggle sub-navigation
600. Regulated Data Security
News & Announcements
Toggle sub-navigation
Close this sub-navigation
News & Announcements
Phishing Alerts
Blog
Toggle sub-navigation
Archived News
Be Cyber Smart!
Close
Requests for UIS Services
Open sub-navigation
Close sub-navigation
Security Standards
Open sub-navigation
Close sub-navigation
Security Standards for Georgetown Technology
Open sub-navigation
Close sub-navigation
Risk Classifications for Georgetown Assets and Data
Open sub-navigation
Close sub-navigation
Minimum Security
Open sub-navigation
Close sub-navigation
Security Considerations for Cloud Services
Open sub-navigation
Close sub-navigation
Technology Policies
Open sub-navigation
Close sub-navigation
100. University Security
Open sub-navigation
Close sub-navigation
200. Information Systems Security
Open sub-navigation
Close sub-navigation
300. Identity & Access Security
Open sub-navigation
Close sub-navigation
400. Data Security
Open sub-navigation
Close sub-navigation
500. 3rd-Party Security
Open sub-navigation
Close sub-navigation
600. Regulated Data Security
Open sub-navigation
Close sub-navigation
News & Announcements
Open sub-navigation
Close sub-navigation
News & Announcements
Open sub-navigation
Close sub-navigation
Phishing Alerts
Open sub-navigation
Close sub-navigation
Blog
Open sub-navigation
Close sub-navigation
Archived News
Open sub-navigation
Close sub-navigation
Be Cyber Smart!
Open sub-navigation
Close sub-navigation
400. Data Security
Home
▸
Technology Policies
▸
400. Data Security
UIS.401 Data Management Policy
UIS.401.1 Data Classification Guidelines
UIS.401.2 Data Destruction Guidelines
UIS 401.3 Data Handling Guidelines
Research Data Protection Guidelines
Security Risk Classifications for Data
Report a Data Security Incident