ESI: Electronically Stored Information Procedures

Electronically Stored Information (ESI) Incident Response Procedures

Do you understand the proper procedures for disclosing student or UNH information?

Information technology service providers, data stewards and persons who are authorized to access certain restricted and sensitive information are expected to protect such data from unauthorized access and exposure of the data. This document provides information about which policies, procedures and laws apply to ESI incidents; it identifies the types of situations that require that employees follow ESI procedures, and outlines documentation procedures for ESI incidents.   View the ESI document

UNH Information Security Services also provides an Incident Response Plan to authorized UNH personnel responding to a data breach or other security incident.   Contact ISS  for that plan.   

Request for Access to Confidential and/or Password Protected Information

University policy requires documented approval from any person whose protected information will be released; in certain cases, VP approval is an alternative. See the  UNH OLPM, Section F, Subsection 4. Privacy and Security of Technological Resources   for the complete requirements. 

A request to access personal protected information can be made online via the  IT Accounts Management System .  Login to AMS and use the "Request To Access Password/Confidential Information" link under Links and Instructions.  For any questions regarding the form or process contact the IT Service Desk at 603 862-4242.

Custom Fields
  • Department: Information Security Services
Attached Files (1)
Related Articles RSS Feed
System Center 2012 Endpoint Protection Windows Installation
Viewed 5195 times since Wed, Aug 12, 2015
Using Facebook, Google or other Social Login Services
Viewed 462 times since Fri, Aug 26, 2016
Password Managers 101
Viewed 27 times since Mon, Oct 16, 2017
Antivirus Software for Windows
Viewed 4760 times since Wed, Aug 12, 2015
PCI DSS - Payment Card Security
Viewed 891 times since Thu, May 7, 2015
Storing Restricted and Sensitive Data in Box @ UNH
Viewed 759 times since Thu, May 28, 2015
Signs Your Account is Compromised
Viewed 75 times since Wed, Aug 16, 2017
File-Sharing Policy
Viewed 464 times since Tue, Jun 2, 2015
Vendor Contracts: Privacy Considerations, Security Review, and NDA
Viewed 1471 times since Mon, May 4, 2015
Tax Related Identity Theft
Viewed 481 times since Wed, Feb 17, 2016
MENU