Access to User Data Procedures

Summary

This article outlines the types of investigations and the appropriate authority to sign off on each.

Body

Objective

In accordance with the Information Security and Acceptable Use Policy, server and application administrators may be called upon to provide information to support authorized investigations. This procedure document outlines the types of investigations and the appropriate authority to sign off on each.

Responsibilities

Purpose

User(s) involved

Authorized requestor

Authorized approver

Additional requirements

Legal issues (Litigation hold, etc.)

Any

UTD Attorney or UT System OGC

None needed

Document chain of custody

Criminal investigation

Any

UTD Police

UTD Attorney

Document chain

of custody

HR investigation

Current or former faculty, staff, or student workers

HR

Associate VP, HR

None needed

Compliance investigation

Current or former faculty, staff, or student workers

Office of Institutional Compliance

Assistant VP, Office of Institutional Equity and

Compliance

None needed

Internal Audit

Any

Internal Audit

Executive Director, IA

None needed

Academic investigation

Current or former student

Office of Community Standards and Conduct

Dean of Students

None needed

Continuity of business

Former faculty or

staff

User's Dept.

Head

None / University

Attorney1

None needed

Continuity of business

Current faculty or staff

User's Dept. Head

Associate VP, HR

If account is active, user must be unavailable.

Open Records Request

Any

Office of

Administration

None needed

None needed

Note: University Attorney should be consulted in cases that are unusual or not objectively reasonable.

If you need to submit a request, click here. Note that you must be the "Authorized Requestor" as is indicated in the table above.

Exemptions

In the event that compliance with this procedure cannot be met, please contact infosecurity@utdallas.edu to submit an exemption request which will be approved or denied by the CISO. Denied exemption requests may be appealed to the UTD President for final decision. 

Details

Details

Article ID: 368
Created
Mon 11/22/21 1:52 PM
Modified
Fri 10/11/24 2:26 PM

Related Articles

Related Articles (1)

This article outlines the steps that should be taken if a supervisor, manager, or executive requires access to the email account of a former employee.

Related Services / Offerings

Related Services / Offerings (1)

This service offering allows for users to request data as needed to continue providing business services for the University.