When establishing a database containing confidential information hosted on or off
campus, there must be efforts to establish appropriate security controls for safeguarding
data. While procedures and guidelines are recommended as a best practice, it is important
to determine the level of value and risk for establishing the database. Efforts must
also be performed to confirm servers are not duplicating services. If you have any
questions or wish to discuss further, please contact us.
Before filling out this form please familiarize yourself with the CSU and University's
Policy on Information Security and the procedure for establishing a database containing
confidential records. The CSU and University's Information Security Policies may be
viewed at its.csub.edu/security.
To contact CSUB Information Security, visit its.csub.edu/security.
- Security Overview
- Confidential Document Shredding
- Contact Information
- Definition of Confidential Information
- Desktop Security Reviews
- Government Regulations
- Incident Reporting
- Information Security Plan
- Information Security Policy
- Application for Database
- Red Flag
- Enhancing Security Encryption
- AI Guidelines