Before Travel Questions
Export control considerations depend on many factors, including the item, data or technology being taken abroad, the destination country, etc.
If you have questions about whether export control considerations apply to your specific situation, or if you are a researcher who has projects with Technology Control Plans in place, please contact John Craddock before traveling, at email@example.com.
I know I should put the sensitive documents on my machine into OneDrive or SharePoint, but how do I know what counts as 'sensitive'?
As defined in Administrative Regulation 10:7, “Protected data” means data or information that has been designated as private or confidential by law or by the University. Protected data includes, but is not limited to, employment records, medical records, student records, education records, personal financial records (or other individually identifiable information), research data, trade secrets, and classified government information. Protected data does not include public records that by law must be made available to the general public. To the extent there is any uncertainty as to whether any data constitutes protected data, the data in question will be treated as protected data until a determination is made by the University.
a. Private data - Private data is any information that the University is under legal or contractual obligation to protect. Examples of private data include employment, research, and student data.
b. Confidential data - Confidential data is data that by law is not to be publicly disclosed. This designation is used for highly sensitive data whose access is restricted to authorized employees. Examples of confidential data include personally identifiable information in student education records, and personally identifiable non-public information about University employees.
These categories of private and confidential data enumerated above are specific to data residing in University systems. Governing Regulation XIV.B.3, Confidentiality of Information, governs the release of information from the University to the public.
For UK systems, you will need to call ITS Customer Services at 859-218-HELP (4357) to set up Two-Factor Log-In. If you have already enrolled a device, you can change your settings or enroll another device through Account Manager at ukam.uky.edu.
For non-UK systems, you can typically change the security settings to enable two-factor authentication, if available.
Contact your IT representative or call ITS Customer Services at 859-218-HELP (4357).
Many University devices that are managed by ITS already have anti-virus software. If yours does not or you would like advice on anti-virus for your personal machine, you can contact firstname.lastname@example.org.