100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CDS 130 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
16-10-2025
Written in
2025/2026

CDS 130 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE University policies & What are they used for? - Answers These policies govern the privacy, security, and confidentiality of university data, especially highly sensitive data, and the responsibilities of institutional units and individuals for such data. University policies & Who do these policies apply to? - Answers These policies apply to all academic and operational departments and offices at all George Mason University locations, owned and leased. The policies and procedures provided herein apply to all University faculty, staff, students, visitors and contractors. University policies & What are violations to these policies? - Answers The university forbids the disclosure of protected data in any medium except as approved in advance by a Data Owner. The use of any protected university data for one's own personal gain or profit, for the personal gain or profit of others, or to satisfy personal curiosity is strictly prohibited. University policies & If you violate these policies, what are some courses of actions that can be pursued by MASON? - Answers Any university employee, student or non-university individual with access to university data who engages in unauthorized use, disclosure, alteration, or destruction of data is in violation of this policy and will be subject to appropriate disciplinary action, including possible dismissal and/or legal action. University policies & What are the types of data/resources covered by these policies? - Answers Student Information: (Social Security number & date of birth) associated with a person Employee/Donor/Contractor/Affiliate Information: Driver's license associated with a personal identifier Background checks What are the roles and responsibilities of the various stakeholders involved in the policy? - Answers A data steward is a stakeholder role and they are.... Someone that establishes policies and direction for the overall security and privacy of all university data, particularly highly sensitive data within the respective areas of responsibility Why are stakeholder roles necessary? - Answers Hackers that want to use your data to steal your identification, phone number, date of birth and email address need to be guarded against What type of data do MASON protect? - Answers (PII) Personally identifiable data like birthday and Social security What approaches is MASON using to protect your data? - Answers Two factor authentication for faculty and staff Virtual private network access which requires you to provide a username and password What are some of the characteristics of a good password? - Answers Long passwords are better Pass-Phrases (sentence of known words) Use a different username & password for every account Use upper case + lower case + numbers What are examples of some common Password protection tools? - Answers Resetting the password every so often Using password generators Using password saving software CAS - central authentication services Shibboleth - works like CAS in requiring a username & password basis What is ethics? - Answers It is the set of well-established principles of right and wrong What are the different levels available to help guide ethical behavior? - Answers Principles Policies Regulations

Show more Read less
Institution
CDS 130
Course
CDS 130









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CDS 130
Course
CDS 130

Document information

Uploaded on
October 16, 2025
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CDS 130 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE 2025-2026

University policies & What are they used for? - Answers These policies govern the privacy,
security, and confidentiality of university data, especially highly sensitive data, and the
responsibilities of institutional units and individuals for such data.

University policies & Who do these policies apply to? - Answers These policies apply to all
academic and operational departments and offices at all George Mason University locations,
owned and leased. The policies and procedures provided herein apply to all University faculty,
staff, students, visitors and contractors.

University policies & What are violations to these policies? - Answers The university forbids the
disclosure of protected data in any medium except as approved in advance by a Data Owner.
The use of any protected university data for one's own personal gain or profit, for the personal
gain or profit of others, or to satisfy personal curiosity is strictly prohibited.

University policies & If you violate these policies, what are some courses of actions that can be
pursued by MASON? - Answers Any university employee, student or non-university individual
with access to university data who engages in unauthorized use, disclosure, alteration, or
destruction of data is in violation of this policy and will be subject to appropriate disciplinary
action, including possible dismissal and/or legal action.

University policies & What are the types of data/resources covered by these policies? - Answers
Student Information:



(Social Security number & date of birth) associated with a person



Employee/Donor/Contractor/Affiliate Information:



Driver's license associated with a personal identifier Background checks

What are the roles and responsibilities of the various stakeholders involved in the policy? -
Answers A data steward is a stakeholder role and they are....

Someone that establishes policies and direction for the overall security and privacy of all
university data, particularly highly sensitive data within the respective areas of responsibility

Why are stakeholder roles necessary? - Answers Hackers that want to use your data to steal
your identification, phone number, date of birth and email address need to be guarded against

What type of data do MASON protect? - Answers (PII) Personally identifiable data like birthday

, and Social security

What approaches is MASON using to protect your data? - Answers Two factor authentication for
faculty and staff

Virtual private network access which requires you to provide a username and password

What are some of the characteristics of a good password? - Answers Long passwords are
better

Pass-Phrases (sentence of known words)

Use a different username & password for every account

Use upper case + lower case + numbers

What are examples of some common Password protection tools? - Answers Resetting the
password every so often

Using password generators

Using password saving software

CAS - central authentication services

Shibboleth - works like CAS in requiring a username & password basis

What is ethics? - Answers It is the set of well-established principles of right and wrong

What are the different levels available to help guide ethical behavior? - Answers Principles

Policies

Regulations

Laws

What is The honor code pledge? - Answers A pledge to not plagiarize, cheat, lie or steal
information

What is the Honor Code committee? - Answers Members of the committee serve on hearing
panels established to investigate and resolve alleged violations of the Honor Code.

Who are the members of the Honor Code committee? - Answers Honor Committee panels
consist of three Honor Committee members. In cases where a graduate student has been
referred, at least one member of the Honor Committee must be either a graduate student, an
administrative faculty member, a classified staff member, or a faculty member.

How are members of the Honor Code committee selected? - Answers Membership on the

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
37
Member since
8 months
Number of followers
1
Documents
11279
Last sold
3 days ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions