Investigators should consult with their College’s Information Technology Manager for guidance on requirements for cyber security.
Cyber security plans must be reviewed and accepted by the Responsible Official. Data security must be part of the risk assessment process.