Data handling guidelines


Description

A set of handling procedures for the protection of Institutional Data.  

The University of Iowa relies upon various collections of data to support its academic, service and research missions.  In order to protect this data from many types of risk, and in order to support legal and regulatory requirements, these guidelines describe the technical and operational controls required for minimizing the risks associated with each level of data classification.

Activities

The following table outlines the minimum guidelines for each data classification level.  Note that specific laws, regulations or contracts may require additional requirements beyond those described below. 

ActivityCriticalRestrictedUniversity-InternalPublic
DisposalAll data will be rendered unrecoverable using industry best practices, and sensitive data disposal will be accompanied with documentation indicating that it was properly destroyed.All data will be rendered unrecoverable using industry best practices, and sensitive data disposal will be accompanied with documentation indicating that it was properly destroyed.

All data will be rendered unrecoverable using industry best practices.

 

No controls required. 
Email (Internal)OK to sendOK to sendOK to sendOK to send
Email (External)Encryption requiredEncryption requiredOK to sendOK to send
Non-email electronic transmissionEncryption requiredEncryption requiredEncryption recommendedEncryption recommended
PaperOK for internal use; shred for disposal

OK for internal use; shred for disposal

 

OK for internal use; shred when appropriate

 

OK for any use
Mail/ShippingOK to known recipientOK to known recipientOK to known recipientOK
FaxOK to Fax to known recipientOK to Fax to known recipientOK to Fax to known recipientOK
Database storageOK with authenticated access control

OK with authenticated access control

 

OK with authenticated access control

 

OK with or without authenticated access control
Internal file storage (managed by IT)

OK with authenticated access control

 

OK with authenticated access control

 

OK with authenticated access control

 

OK with or without authenticated access control
Archive/backup storage (managed by IT)Encryption requiredEncryption requiredEncryption recommendedOK to store
Storage manged by user (university-owned: external drive, DVD, etc.)Encryption requiredEncryption requiredEncryption recommended

Encryption recommended

 

University device (workstation, laptop, mobile)Encryption requiredEncryption requiredOK to storeOK to store
Personal/non-university deviceNot permittedNot permittedNot recommendedOK to store
University cloud storageOK with authenticated access controlOK with authenticated access controlOK with authenticated access controlOK
Personal cloud storage (including email)Not permittedNot permittedNot permittedOK
RetentionDocumented and monitoredDocumented and monitoredDocumentedDocumented
Logging/auditingLogs forwarded to SEIMLogs Forwarded to SEIMLogging recommendedLogging recommended
Artificial Intelligence (AI)Security review requiredSecurity review requriedSecurity review requiredOK

 

Related Policies and Guidelines

Classifying Institutional Data

Data Classification Guide to IT Services

Device Security Standard

Institutional Data Policy

Security Policy

Security Review Frequently Asked Questions

 

Last updated 6/10/2025