Table of Contents
- Identity Theft Prevention Program - Red Flags Rule
- PCI DSS Credit Card Handling
- DMCA Copyright Compliance / Peer-to-Peer File Sharing
- Security Incident: Management and Reporting Policy
- Preservation and Collection of Electronic Records (eDiscovery)
- Technology Security Laws and Regulations
Which Ones Apply to You?
All legal and regulatory compliance requirements apply regardless of whether you are using a university owned or managed device or a personally owned device to work with sensitive university data. Different laws, regulations, and compliance requirements apply to different types of sensitive university data. Familiarize yourself with those that apply to the data you work with.