Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

2. Review the file locations of search results for the top users you identified. Information Security recommends reviewing the top 5-10 users or reviewing all users with a certain number of matches or above. Use your judgement on whether these files contain University data or personal records. In either case, you should contact the user to inform them that they have this data; however, University data is of a higher priority from an institutional perspective. If you are sure that a file does not contain sensitive data, you can exclude it from the results or add it to the "Global Ignore List."

3. If any potential sensitive data still remains, contact the user or users' support provider to help them locate and evaluate the contents of the files. In the majority of cases, the information is not necessary for the user's job or business and they are eager to remove sensitive information. If they need the information or would like to retain it for personal reasons, they will inform you and you can put those individual results on the "Exclude" or "Global Ignore List."

Navigate to the Identity Finder Console page at https://tftmvmidfind.tufts.ad.tufts.edu/Console/ and log in.

...