The importance of IT policies and how they protect the university - Michigan Medicine Headlines

2 years ago 70

Cybersecurity is the safeguarding of networks, machine systems and delicate information. 

Technology, policies and processes, and behaviors are components that marque up cybersecurity. 

Policies are a mode for organizations to pass however their employees should grip circumstances and run technology. It’s indispensable to recognize and beryllium knowledgeable astir the policies that impact your regular activities. 

The U-M Standard Practice Guides (SPGs) are universitywide policies. They use to the full institution. 

Some units whitethorn make further policies and procedures to follow, but they indispensable stay accordant with the SPGs. 

Data Security Standards (DS) connection elaborate guidance for applying assemblage policies. Information Security (SPG 601.27) is simply a large spot to larn astir information types and their protection.

Michigan Medicine policies are derived from the larger U-M frameworks. These policies supply further restrictions and specificity — and are designed to code the unsocial wellness attraction situation of Michigan Medicine. 

To larn much astir Michigan Medicine’s policies, including IT-related policies, sojourn PolicyStat.

A caller IT policy, the Information Security Discipline Policy, was published implicit the summer. This caller argumentation is an hold of Violations of Privacy oregon Security of Protected Health Information (PHI) oregon Other Sensitive Information for All Michigan Medicine Workforce Policy, 01-04-390. These policies volition guarantee interior incidents (intentional oregon accidental) violating IT information policies, systems, networks and services are handled appropriately.

Remember, cyber information doesn’t necessitate you to beryllium an adept successful IT. 

Familiarize yourself with U-M and Michigan Medicine IT policies, information standards and champion practices. Adherence to IT argumentation is different cardinal portion successful the cyber information puzzle.

Read Entire Article