University policies & What are they used for? - Answers These policies govern the privacy,
security, and confidentiality of university data, especially highly sensitive data, and the
responsibilities of institutional units and individuals for such data.
University policies & Who do these policies apply to? - Answers These policies apply to all
academic and operational departments and offices at all George Mason University locations,
owned and leased. The policies and procedures provided herein apply to all University faculty,
staff, students, visitors and contractors.
University policies & What are violations to these policies? - Answers The university forbids the
disclosure of protected data in any medium except as approved in advance by a Data Owner.
The use of any protected university data for one's own personal gain or profit, for the personal
gain or profit of others, or to satisfy personal curiosity is strictly prohibited.
University policies & If you violate these policies, what are some courses of actions that can be
pursued by MASON? - Answers Any university employee, student or non-university individual
with access to university data who engages in unauthorized use, disclosure, alteration, or
destruction of data is in violation of this policy and will be subject to appropriate disciplinary
action, including possible dismissal and/or legal action.
University policies & What are the types of data/resources covered by these policies? - Answers
Student Information:
(Social Security number & date of birth) associated with a person
Employee/Donor/Contractor/Affiliate Information:
Driver's license associated with a personal identifier Background checks
What are the roles and responsibilities of the various stakeholders involved in the policy? -
Answers A data steward is a stakeholder role and they are....
Someone that establishes policies and direction for the overall security and privacy of all
university data, particularly highly sensitive data within the respective areas of responsibility
Why are stakeholder roles necessary? - Answers Hackers that want to use your data to steal
your identification, phone number, date of birth and email address need to be guarded against
What type of data do MASON protect? - Answers (PII) Personally identifiable data like birthday
, and Social security
What approaches is MASON using to protect your data? - Answers Two factor authentication for
faculty and staff
Virtual private network access which requires you to provide a username and password
What are some of the characteristics of a good password? - Answers Long passwords are
better
Pass-Phrases (sentence of known words)
Use a different username & password for every account
Use upper case + lower case + numbers
What are examples of some common Password protection tools? - Answers Resetting the
password every so often
Using password generators
Using password saving software
CAS - central authentication services
Shibboleth - works like CAS in requiring a username & password basis
What is ethics? - Answers It is the set of well-established principles of right and wrong
What are the different levels available to help guide ethical behavior? - Answers Principles
Policies
Regulations
Laws
What is The honor code pledge? - Answers A pledge to not plagiarize, cheat, lie or steal
information
What is the Honor Code committee? - Answers Members of the committee serve on hearing
panels established to investigate and resolve alleged violations of the Honor Code.
Who are the members of the Honor Code committee? - Answers Honor Committee panels
consist of three Honor Committee members. In cases where a graduate student has been
referred, at least one member of the Honor Committee must be either a graduate student, an
administrative faculty member, a classified staff member, or a faculty member.
How are members of the Honor Code committee selected? - Answers Membership on the